First published: Wed Sep 28 2022(Updated: )
Apache Tomcat could allow a remote attacker to obtain sensitive information, caused by a long standing concurrency flaw in the simplified implementation of blocking reads and writes. By sending a specially-crafted request, an attacker could exploit this vulnerability to obtain Http11Processor instance information, and use this information to launch further attacks against the affected system.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/tomcat9 | <=9.0.31-1~deb10u6 | 9.0.31-1~deb10u10 9.0.43-2~deb11u6 9.0.43-2~deb11u9 9.0.70-2 |
Apache Tomcat | >=8.5.0<=8.5.77 | |
Apache Tomcat | >=9.0.0<=9.0.60 | |
Apache Tomcat | >=10.0.0<=10.0.18 | |
Apache Tomcat | =10.1.0-milestone1 | |
Apache Tomcat | =10.1.0-milestone10 | |
Apache Tomcat | =10.1.0-milestone11 | |
Apache Tomcat | =10.1.0-milestone12 | |
Apache Tomcat | =10.1.0-milestone2 | |
Apache Tomcat | =10.1.0-milestone3 | |
Apache Tomcat | =10.1.0-milestone4 | |
Apache Tomcat | =10.1.0-milestone5 | |
Apache Tomcat | =10.1.0-milestone6 | |
Apache Tomcat | =10.1.0-milestone7 | |
Apache Tomcat | =10.1.0-milestone8 | |
Apache Tomcat | =10.1.0-milestone9 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
IBM IBM® Engineering Requirements Management DOORS | <=9.7.2.7 | |
IBM IBM® Engineering Requirements Management DOORS Web Access | <=9.7.2.7 | |
maven/org.apache.tomcat:tomcat | >=10.1.0-M1<10.1.0-M14 | 10.1.0-M14 |
maven/org.apache.tomcat:tomcat | >=10.0.0-M1<10.0.20 | 10.0.20 |
maven/org.apache.tomcat:tomcat | >=9.0.0-M1<9.0.62 | 9.0.62 |
maven/org.apache.tomcat:tomcat | >=8.5.0<8.5.78 | 8.5.78 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.