This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M20, from 10.1.0-M1 through 10.1.24, from 9.0.13 through 9.0.89.
The following versions were EOL at the time the CVE was created but are
known to be affected: 8.5.35 through 8.5.100 and 7.0.92 through 7.0.109. Other EOL versions may also be affected.
Users are recommended to upgrade to version 11.0.0-M21, 10.1.25, or 9.0.90, which fixes the issue.
Apache Tomcat, under certain configurations on any platform, allows an attacker to cause an OutOfMemoryError by abusing the TLS handshake process.
Subscriptions
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4017-1 | tomcat9 security update |
Debian DSA |
DSA-5845-1 | tomcat10 security update |
EUVD |
EUVD-2024-3211 | Allocation of Resources Without Limits or Throttling vulnerability in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M20, from 10.1.0-M1 through 10.1.24, from 9.0.13 through 9.0.89. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.35 through 8.5.100 and 7.0.92 through 7.0.109. Users are recommended to upgrade to version 11.0.0-M21, 10.1.25, or 9.0.90, which fixes the issue. Apache Tomcat, under certain configurations on any platform, allows an attacker to cause an OutOfMemoryError by abusing the TLS handshake process. |
Github GHSA |
GHSA-7jqf-v358-p8g7 | Apache Tomcat Allocation of Resources Without Limits or Throttling vulnerability |
Ubuntu USN |
USN-7562-1 | Tomcat vulnerabilities |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 03 Nov 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 29 Oct 2025 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Allocation of Resources Without Limits or Throttling vulnerability in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M20, from 10.1.0-M1 through 10.1.24, from 9.0.13 through 9.0.89. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.35 through 8.5.100 and 7.0.92 through 7.0.109. Users are recommended to upgrade to version 11.0.0-M21, 10.1.25, or 9.0.90, which fixes the issue. Apache Tomcat, under certain configurations on any platform, allows an attacker to cause an OutOfMemoryError by abusing the TLS handshake process. | Allocation of Resources Without Limits or Throttling vulnerability in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M20, from 10.1.0-M1 through 10.1.24, from 9.0.13 through 9.0.89. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.35 through 8.5.100 and 7.0.92 through 7.0.109. Other EOL versions may also be affected. Users are recommended to upgrade to version 11.0.0-M21, 10.1.25, or 9.0.90, which fixes the issue. Apache Tomcat, under certain configurations on any platform, allows an attacker to cause an OutOfMemoryError by abusing the TLS handshake process. |
Fri, 08 Aug 2025 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Allocation of Resources Without Limits or Throttling vulnerability in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M20, from 10.1.0-M1 through 10.1.24, from 9.0.13 through 9.0.89. Older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.0-M21, 10.1.25, or 9.0.90, which fixes the issue. Apache Tomcat, under certain configurations on any platform, allows an attacker to cause an OutOfMemoryError by abusing the TLS handshake process. | Allocation of Resources Without Limits or Throttling vulnerability in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M20, from 10.1.0-M1 through 10.1.24, from 9.0.13 through 9.0.89. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.35 through 8.5.100 and 7.0.92 through 7.0.109. Users are recommended to upgrade to version 11.0.0-M21, 10.1.25, or 9.0.90, which fixes the issue. Apache Tomcat, under certain configurations on any platform, allows an attacker to cause an OutOfMemoryError by abusing the TLS handshake process. |
Thu, 07 Aug 2025 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Allocation of Resources Without Limits or Throttling vulnerability in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M20, from 10.1.0-M1 through 10.1.24, from 9.0.13 through 9.0.89. Older, unsupported versions may also be affected. Users are recommended to upgrade to version 11.0.0-M21, 10.1.25, or 9.0.90, which fixes the issue. Apache Tomcat, under certain configurations on any platform, allows an attacker to cause an OutOfMemoryError by abusing the TLS handshake process. | Allocation of Resources Without Limits or Throttling vulnerability in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M20, from 10.1.0-M1 through 10.1.24, from 9.0.13 through 9.0.89. Older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.0-M21, 10.1.25, or 9.0.90, which fixes the issue. Apache Tomcat, under certain configurations on any platform, allows an attacker to cause an OutOfMemoryError by abusing the TLS handshake process. |
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Tue, 11 Feb 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Netapp
Netapp ontap Tools |
|
| CPEs | cpe:2.3:a:apache:tomcat:10.1.0:milestone10:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:10.1.0:milestone11:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:10.1.0:milestone12:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:10.1.0:milestone13:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:10.1.0:milestone14:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:10.1.0:milestone15:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:10.1.0:milestone16:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:10.1.0:milestone17:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:10.1.0:milestone18:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:10.1.0:milestone19:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:10.1.0:milestone1:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:10.1.0:milestone20:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:10.1.0:milestone2:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:10.1.0:milestone3:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:10.1.0:milestone4:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:10.1.0:milestone5:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:10.1.0:milestone6:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:10.1.0:milestone7:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:10.1.0:milestone8:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:10.1.0:milestone9:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:11.0.0:milestone10:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:11.0.0:milestone11:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:11.0.0:milestone12:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:11.0.0:milestone13:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:11.0.0:milestone14:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:11.0.0:milestone15:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:11.0.0:milestone16:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:11.0.0:milestone17:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:11.0.0:milestone18:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:11.0.0:milestone19:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:11.0.0:milestone1:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:11.0.0:milestone20:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:11.0.0:milestone2:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:11.0.0:milestone3:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:11.0.0:milestone4:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:11.0.0:milestone5:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:11.0.0:milestone6:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:11.0.0:milestone7:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:11.0.0:milestone8:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:11.0.0:milestone9:*:*:*:*:*:* cpe:2.3:a:netapp:ontap_tools:10:*:*:*:*:vmware_vsphere:*:* cpe:2.3:a:netapp:ontap_tools:9:*:*:*:*:vmware_vsphere:*:* |
|
| Vendors & Products |
Netapp
Netapp ontap Tools |
Fri, 22 Nov 2024 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 07 Nov 2024 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apache
Apache tomcat |
|
| CPEs | cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Apache
Apache tomcat |
|
| Metrics |
ssvc
|
Thu, 07 Nov 2024 07:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was found in Tomcat. Under certain configurations on any platform, this flaw allows an attacker to cause an OutOfMemoryError by abusing the TLS handshake process. | Allocation of Resources Without Limits or Throttling vulnerability in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M20, from 10.1.0-M1 through 10.1.24, from 9.0.13 through 9.0.89. Older, unsupported versions may also be affected. Users are recommended to upgrade to version 11.0.0-M21, 10.1.25, or 9.0.90, which fixes the issue. Apache Tomcat, under certain configurations on any platform, allows an attacker to cause an OutOfMemoryError by abusing the TLS handshake process. |
| Title | tomcat: Denial of Service in Tomcat | Apache Tomcat: Denial of Service |
| Weaknesses | CWE-770 | |
| Metrics |
cvssV3_1
|
cvssV3_1
|
Wed, 30 Oct 2024 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:rhel_aus:8.2 cpe:/a:redhat:rhel_aus:8.6 cpe:/a:redhat:rhel_e4s:8.6 cpe:/a:redhat:rhel_tus:8.6 |
Tue, 29 Oct 2024 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat rhel Aus
Redhat rhel E4s Redhat rhel Tus |
|
| CPEs | cpe:/a:redhat:rhel_aus:8.4 cpe:/a:redhat:rhel_e4s:8.4 cpe:/a:redhat:rhel_eus:9.0 cpe:/a:redhat:rhel_tus:8.4 |
|
| Vendors & Products |
Redhat rhel Aus
Redhat rhel E4s Redhat rhel Tus |
Fri, 11 Oct 2024 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:rhel_eus:8.8 |
Thu, 10 Oct 2024 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat enterprise Linux
Redhat rhel Eus |
|
| CPEs | cpe:/a:redhat:enterprise_linux:8 cpe:/a:redhat:enterprise_linux:9 cpe:/a:redhat:rhel_eus:9.2 |
|
| Vendors & Products |
Redhat enterprise Linux
Redhat rhel Eus |
Wed, 02 Oct 2024 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat
Redhat jboss Enterprise Web Server |
|
| CPEs | cpe:/a:redhat:jboss_enterprise_web_server:5.8 cpe:/a:redhat:jboss_enterprise_web_server:5.8::el7 cpe:/a:redhat:jboss_enterprise_web_server:5.8::el8 cpe:/a:redhat:jboss_enterprise_web_server:5.8::el9 cpe:/a:redhat:jboss_enterprise_web_server:6.0 cpe:/a:redhat:jboss_enterprise_web_server:6.0::el8 cpe:/a:redhat:jboss_enterprise_web_server:6.0::el9 |
|
| Vendors & Products |
Redhat
Redhat jboss Enterprise Web Server |
Wed, 25 Sep 2024 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | No description is available for this CVE. | A vulnerability was found in Tomcat. Under certain configurations on any platform, this flaw allows an attacker to cause an OutOfMemoryError by abusing the TLS handshake process. |
Wed, 25 Sep 2024 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | No description is available for this CVE. | |
| Title | tomcat: Denial of Service in Tomcat | |
| Weaknesses | CWE-400 | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-11-03T20:38:04.247Z
Reserved: 2024-06-12T16:27:23.740Z
Link: CVE-2024-38286
Updated: 2025-11-03T20:38:04.247Z
Status : Modified
Published: 2024-11-07T08:15:13.007
Modified: 2025-11-03T21:16:14.353
Link: CVE-2024-38286
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Github GHSA
Ubuntu USN