Confirm unsubscribe

On Wed, Sep 28, 2022 at 8:36 PM Nicholas Ascione <nick.asci...@gmail.com>
wrote:

> Confirm unsubscribe
>
> On Wed, Sep 28, 2022 at 9:01 AM Mark Thomas <ma...@apache.org> wrote:
>
> > CVE-2021-43980 Apache Tomcat - Information Disclosure
> >
> > Severity: High
> >
> > Vendor: The Apache Software Foundation
> >
> > Versions Affected:
> > Apache Tomcat 10.1.0-M1 to 10.1.0-M12
> > Apache Tomcat 10.0.0-M1 to 10.0.18
> > Apache Tomcat 9.0.0-M1 to 9.0.60
> > Apache Tomcat 8.5.0 to 8.5.77
> >
> > Description:
> > The simplified implementation of blocking reads and writes introduced in
> > Tomcat 10 and back-ported to Tomcat 9.0.47 onwards exposed a long
> > standing (but extremely hard to trigger) concurrency bug that could
> > cause client connections to share an Http11Processor instance resulting
> > in responses, or part responses, to be received by the wrong client.
> >
> > Mitigation:
> > Users of the affected versions should apply one of the following
> > mitigations:
> > - Upgrade to Apache Tomcat 10.1.0-M14 or later once released
> > - Upgrade to Apache Tomcat 10.0.20 or later once released
> > - Upgrade to Apache Tomcat 9.0.62 or later once released
> > - Upgrade to Apache Tomcat 8.5.78 or later once released
> > - Note 10.1.0-M13, 10.0.19 and 9.0.61 were not released
> >
> > Credit:
> > Thanks to Adam Thomas, Richard Hernandez and Ryan Schmitt for
> > discovering the issue and working with the Tomcat security team to
> > identify the root cause and appropriate fix.
> >
> > History:
> > 2022-09-28 Original advisory
> >
> > References:
> > [1] https://tomcat.apache.org/security-10.html
> > [2] https://tomcat.apache.org/security-9.html
> > [3] https://tomcat.apache.org/security-8.html
> >
> >
> > ---------------------------------------------------------------------
> > To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
> > For additional commands, e-mail: users-h...@tomcat.apache.org
> >
> >
>

Reply via email to