{"id":"CVE-2024-52317","details":"Incorrect object re-cycling and re-use vulnerability in Apache Tomcat. Incorrect recycling of the request and response used by HTTP/2 requests \ncould lead to request and/or response mix-up between users.\n\nThis issue affects Apache Tomcat: from 11.0.0-M23 through 11.0.0-M26, from 10.1.27 through 10.1.30, from 9.0.92 through 9.0.95.\n\nUsers are recommended to upgrade to version 11.0.0, 10.1.31 or 9.0.96, which fixes the issue.","aliases":["BIT-tomcat-2024-52317","GHSA-qvf5-hvjx-wm27"],"modified":"2026-02-11T08:02:17.908332Z","published":"2024-11-18T12:15:18.727Z","related":["SUSE-SU-2025:0033-1","SUSE-SU-2025:0058-1","openSUSE-SU-2025:14911-1","openSUSE-SU-2025:14915-1"],"references":[{"type":"ADVISORY","url":"https://lists.apache.org/thread/ty376mrxy1mmxtw3ogo53nc9l3co3dfs"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2024/11/18/3"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20250124-0004/"},{"type":"ARTICLE","url":"https://lists.apache.org/thread/ty376mrxy1mmxtw3ogo53nc9l3co3dfs"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2024/11/18/3"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/apache/tomcat","events":[{"introduced":"50d264f3bc6c8595a1e611940668fb46d076e0ba"},{"fixed":"b07cda9f3cc385f6f2d6c0701a050317979745dc"},{"introduced":"b6ca266795a4245f3c3308a619987136ad46e19a"},{"fixed":"7ecea31658766b7d0ce7fee5a34564b67c68e789"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-52317.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"}]}