A vulnerability in Apache Tomcat allows an attacker to remotely trigger a denial of service. An error introduced as part of a change to improve error handling during non-blocking I/O meant that the error flag associated with the Request object was not reset between requests. This meant that once a non-blocking I/O error occurred, all future requests handled by that request object would fail. Users were able to trigger non-blocking I/O errors, e.g. by dropping a connection, thereby creating the possibility of triggering a DoS. Applications that do not use non-blocking I/O are not exposed to this vulnerability. This issue affects Apache Tomcat 10.0.3 to 10.0.4; 9.0.44; 8.5.64.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published: 2021-07-12T14:55:12

Updated: 2024-08-03T22:40:31.655Z

Reserved: 2021-04-13T00:00:00

Link: CVE-2021-30639

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-07-12T15:15:08.333

Modified: 2024-11-21T06:04:20.727

Link: CVE-2021-30639

cve-icon Redhat

Severity : Important

Publid Date: 2021-07-12T00:00:00Z

Links: CVE-2021-30639 - Bugzilla