-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Mark,

On 1/22/12 5:08 PM, ma...@apache.org wrote:
> Christopher Schultz <ch...@christopherschultz.net> wrote:
> 
>> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
>> 
>> David,
>> 
>> On 1/21/12 3:02 AM, David Jorm wrote:
>>> Based on reading the advisory and Tomcat patch code, it seems
>>> to me that the issue is simply slow processing when a very
>>> large number of parameters is received with a request.
>> 
>> The parameter names must have colliding hash code values in order
>> to exercise this particular vulnerability. Otherwise, large
>> numbers of request parameters is merely a potential memory
>> exhaustion vulnerability (which is a different issue).
> 
> No, no, no. That is completely wrong. CVE-2012-0022 is solely about
> the number of parameters and NOTHING TO DO WITH HASH COLLISIONS.

Sorry, the last time I looked-up CVE-2012-0022 it said that it was
just a placeholder which I assumed was being held in reserve for the
hash-collision bug. I see now that the data has been updated and it
even includes a note that it's NOT CVE-2011-4858.

Sorry for the noise.

- -chris
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.17 (Darwin)
Comment: GPGTools - http://gpgtools.org
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAk8dgCcACgkQ9CaO5/Lv0PB2LQCdGnDpbrD6zsjpeaQY6RdcCmgQ
xHoAnRvInr0xIs7srQuXsJOdL+aggSxN
=eJc3
-----END PGP SIGNATURE-----

---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org

Reply via email to