Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2011-4858

Published: 5 January 2012

Apache Tomcat before 5.5.35, 6.x before 6.0.35, and 7.x before 7.0.23 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.

Notes

AuthorNote
mdeslaur
CVE-2011-4084 was rejected as a dupe of this one
fixes overlap with CVE-2012-0022 fixes

Priority

Medium

Status

Package Release Status
tomcat7
Launchpad, Ubuntu, Debian
lucid Does not exist

hardy Does not exist

maverick Does not exist

natty Does not exist

oneiric
Released (7.0.21-1ubuntu0.1)
precise Not vulnerable
(7.0.23-1)
quantal Not vulnerable
(7.0.23-1)
upstream
Released (7.0.23)
tomcat5.5
Launchpad, Ubuntu, Debian
hardy Ignored
(end of life)
lucid Does not exist

maverick Does not exist

natty Does not exist

oneiric Does not exist

precise Does not exist

quantal Does not exist

upstream
Released (5.5.35)
tomcat6
Launchpad, Ubuntu, Debian
hardy Does not exist

lucid
Released (6.0.24-2ubuntu1.10)
maverick
Released (6.0.28-2ubuntu1.6)
natty
Released (6.0.28-10ubuntu2.3)
oneiric
Released (6.0.32-5ubuntu1.2)
precise Not vulnerable
(6.0.35-1)
quantal Not vulnerable
(6.0.35-1)
upstream
Released (6.0.35)