Description
If an async request was completed by the application at the same time as the container triggered the async timeout, a race condition existed that could result in a user seeing a response intended for a different user. An additional issue was present in the NIO and NIO2 connectors that did not correctly track the closure of the connection when an async request was completed by the application and timed out by the container at the same time. This could also result in a user seeing a response intended for another user. Versions Affected: Apache Tomcat 9.0.0.M9 to 9.0.9 and 8.5.5 to 8.5.31.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-4281-1 | tomcat8 security update |
EUVD |
EUVD-2018-0523 | If an async request was completed by the application at the same time as the container triggered the async timeout, a race condition existed that could result in a user seeing a response intended for a different user. An additional issue was present in the NIO and NIO2 connectors that did not correctly track the closure of the connection when an async request was completed by the application and timed out by the container at the same time. This could also result in a user seeing a response intended for another user. Versions Affected: Apache Tomcat 9.0.0.M9 to 9.0.9 and 8.5.5 to 8.5.31. |
Github GHSA |
GHSA-6v52-mj5r-7j2m | Apache Tomcat Race Condition vulnerability |
References
History
No history.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-09-16T17:07:40.261Z
Reserved: 2018-03-09T00:00:00.000Z
Link: CVE-2018-8037
No data.
Status : Modified
Published: 2018-08-02T14:29:00.363
Modified: 2024-11-21T04:13:09.157
Link: CVE-2018-8037
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Github GHSA