CVE-2018-8037
Published: 02 August 2018
If an async request was completed by the application at the same time as the container triggered the async timeout, a race condition existed that could result in a user seeing a response intended for a different user. An additional issue was present in the NIO and NIO2 connectors that did not correctly track the closure of the connection when an async request was completed by the application and timed out by the container at the same time. This could also result in a user seeing a response intended for another user. Versions Affected: Apache Tomcat 9.0.0.M9 to 9.0.9 and 8.5.5 to 8.5.31.
Priority
CVSS 3 base score: 5.9
Status
Package | Release | Status |
---|---|---|
tomcat8 Launchpad, Ubuntu, Debian |
Upstream |
Released
(8.5.32-1)
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Released
(8.5.39-1ubuntu1~18.04.1)
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Not vulnerable
(code not present)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
Patches: Upstream: https://svn.apache.org/r1833907 (8.5.x) Upstream: https://svn.apache.org/r1833826 (8.5.x) Upstream: https://svn.apache.org/r1833832 (8.5.x) Upstream: https://svn.apache.org/r1837531 (8.5.x) |
||
tomcat8.0 Launchpad, Ubuntu, Debian |
Upstream |
Not vulnerable
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Does not exist
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Does not exist
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
Notes
Author | Note |
---|---|
debian | Vulnerable code only present in 8.5.5 to 8.5.31 in 8.x series |