Total vulnerabilities in the database
The simplified implementation of blocking reads and writes introduced in Tomcat 10 and back-ported to Tomcat 9.0.47 onwards exposed a long standing (but extremely hard to trigger) concurrency bug in Apache Tomcat 10.1.0 to 10.1.0-M12, 10.0.0-M1 to 10.0.18, 9.0.0-M1 to 9.0.60 and 8.5.0 to 8.5.77 that could cause client connections to share an Http11Processor instance resulting in responses, or part responses, to be received by the wrong client.
Software | From | Fixed in |
---|---|---|
apache / tomcat | 10.1.0-milestone3 | 10.1.0-milestone3.x |
apache / tomcat | 10.1.0-milestone4 | 10.1.0-milestone4.x |
apache / tomcat | 10.1.0-milestone5 | 10.1.0-milestone5.x |
apache / tomcat | 10.1.0-milestone1 | 10.1.0-milestone1.x |
apache / tomcat | 10.1.0-milestone2 | 10.1.0-milestone2.x |
apache / tomcat | 10.1.0-milestone7 | 10.1.0-milestone7.x |
apache / tomcat | 10.1.0-milestone8 | 10.1.0-milestone8.x |
apache / tomcat | 10.1.0-milestone9 | 10.1.0-milestone9.x |
apache / tomcat | 10.1.0-milestone6 | 10.1.0-milestone6.x |
apache / tomcat | 10.1.0-milestone10 | 10.1.0-milestone10.x |
apache / tomcat | 10.1.0-milestone11 | 10.1.0-milestone11.x |
apache / tomcat | 10.1.0-milestone12 | 10.1.0-milestone12.x |
apache / tomcat | 8.5.0 | 8.5.77.x |
apache / tomcat | 9.0.0 | 9.0.60.x |
apache / tomcat | 10.0.0 | 10.0.18.x |
debian / debian_linux | 10.0 | 10.0.x |
debian / debian_linux | 11.0 | 11.0.x |
![]() |
8.5.0 | 8.5.78 |
![]() |
9.0.0-M1 | 9.0.62 |
![]() |
10.0.0-M1 | 10.0.20 |
![]() |
10.1.0-M1 | 10.1.0-M14 |