Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-43980

Опубликовано: 28 сент. 2022
Источник: redhat
CVSS3: 3.7
EPSS Низкий

Описание

The simplified implementation of blocking reads and writes introduced in Tomcat 10 and back-ported to Tomcat 9.0.47 onwards exposed a long standing (but extremely hard to trigger) concurrency bug in Apache Tomcat 10.1.0 to 10.1.0-M12, 10.0.0-M1 to 10.0.18, 9.0.0-M1 to 9.0.60 and 8.5.0 to 8.5.77 that could cause client connections to share an Http11Processor instance resulting in responses, or part responses, to be received by the wrong client.

Отчет

Red Hat Satellite does not include the affected Apache Tomcat, however, Tomcat is shipped with Red Hat Enterprise Linux and consumed by the Candlepin component of Satellite. Red Hat Satellite users are therefore advised to check the impact state of Red Hat Enterprise Linux, since any necessary fixes will be distributed through the platform.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6tomcat6Not affected
Red Hat Enterprise Linux 7tomcatNot affected
Red Hat Enterprise Linux 8pki-deps:10.6/pki-servlet-engineFix deferred
Red Hat Enterprise Linux 9pki-servlet-engineFix deferred
Red Hat JBoss Web Server 3tomcat7Not affected
Red Hat JBoss Web Server 3tomcat8Not affected
JWS 5.7.0FixedRHSA-2022:727302.11.2022
Red Hat JBoss Web Server 5.7 on RHEL 7jws5-ecjFixedRHSA-2022:727202.11.2022
Red Hat JBoss Web Server 5.7 on RHEL 7jws5-tomcatFixedRHSA-2022:727202.11.2022
Red Hat JBoss Web Server 5.7 on RHEL 7jws5-tomcat-nativeFixedRHSA-2022:727202.11.2022

Показывать по

Дополнительная информация

Статус:

Low

EPSS

Процентиль: 38%
0.00162
Низкий

3.7 Low

CVSS3

Связанные уязвимости

CVSS3: 3.7
ubuntu
больше 2 лет назад

The simplified implementation of blocking reads and writes introduced in Tomcat 10 and back-ported to Tomcat 9.0.47 onwards exposed a long standing (but extremely hard to trigger) concurrency bug in Apache Tomcat 10.1.0 to 10.1.0-M12, 10.0.0-M1 to 10.0.18, 9.0.0-M1 to 9.0.60 and 8.5.0 to 8.5.77 that could cause client connections to share an Http11Processor instance resulting in responses, or part responses, to be received by the wrong client.

CVSS3: 3.7
nvd
больше 2 лет назад

The simplified implementation of blocking reads and writes introduced in Tomcat 10 and back-ported to Tomcat 9.0.47 onwards exposed a long standing (but extremely hard to trigger) concurrency bug in Apache Tomcat 10.1.0 to 10.1.0-M12, 10.0.0-M1 to 10.0.18, 9.0.0-M1 to 9.0.60 and 8.5.0 to 8.5.77 that could cause client connections to share an Http11Processor instance resulting in responses, or part responses, to be received by the wrong client.

CVSS3: 3.7
debian
больше 2 лет назад

The simplified implementation of blocking reads and writes introduced ...

suse-cvrf
больше 2 лет назад

Security update for tomcat

CVSS3: 3.7
github
больше 2 лет назад

Apache Tomcat Race Condition vulnerability

EPSS

Процентиль: 38%
0.00162
Низкий

3.7 Low

CVSS3