发布时间: 2024年11月15日
修改时间: 2024年11月22日
The simplified implementation of blocking reads and writes introduced in Tomcat 10 and back-ported to Tomcat 9.0.47 onwards exposed a long standing (but extremely hard to trigger) concurrency bug in Apache Tomcat 10.1.0 to 10.1.0-M12, 10.0.0-M1 to 10.0.18, 9.0.0-M1 to 9.0.60 and 8.5.0 to 8.5.77 that could cause client connections to share an Http11Processor instance resulting in responses, or part responses, to be received by the wrong client.
NVD | openEuler | |
---|---|---|
CVSS评分 | 3.7 | 3.7 |
Attack Vector | Network | Network |
Attack Complexity | High | High |
Privileges Required | None | None |
User Interaction | None | None |
Scope | Unchanged | Unchanged |
Confidentiality | Low | Low |
Integrity | None | None |
Availability | None | None |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2024-4172 | tomcat security update | 2024年11月15日 |
KylinSec-SA-2024-4210 | tomcat security update | 2024年11月15日 |
KylinSec-SA-2024-5005 | tomcat security update | 2024年11月22日 |
产品 | 包 | 状态 |
---|---|---|
KY3.4-5A | tomcat | Fixed |
KY3.5.2 | tomcat | Fixed |
V6 | tomcat | Fixed |