CVE-2021-43980

Source
https://cve.org/CVERecord?id=CVE-2021-43980
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-43980.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2021-43980
Aliases
Downstream
Related
Published
2022-09-28T14:15:09.880Z
Modified
2026-04-12T00:39:44.097635Z
Severity
  • 3.7 (Low) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
[none]
Details

The simplified implementation of blocking reads and writes introduced in Tomcat 10 and back-ported to Tomcat 9.0.47 onwards exposed a long standing (but extremely hard to trigger) concurrency bug in Apache Tomcat 10.1.0 to 10.1.0-M12, 10.0.0-M1 to 10.0.18, 9.0.0-M1 to 9.0.60 and 8.5.0 to 8.5.77 that could cause client connections to share an Http11Processor instance resulting in responses, or part responses, to be received by the wrong client.

References

Affected packages

Git / github.com/apache/tomcat

Affected ranges

Type
GIT
Repo
https://github.com/apache/tomcat
Events
Database specific
{
    "source": "CPE_FIELD",
    "cpe": [
        "cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*",
        "cpe:2.3:a:apache:tomcat:10.1.0:milestone1:*:*:*:*:*:*",
        "cpe:2.3:a:apache:tomcat:10.1.0:milestone10:*:*:*:*:*:*",
        "cpe:2.3:a:apache:tomcat:10.1.0:milestone11:*:*:*:*:*:*",
        "cpe:2.3:a:apache:tomcat:10.1.0:milestone12:*:*:*:*:*:*",
        "cpe:2.3:a:apache:tomcat:10.1.0:milestone2:*:*:*:*:*:*",
        "cpe:2.3:a:apache:tomcat:10.1.0:milestone3:*:*:*:*:*:*",
        "cpe:2.3:a:apache:tomcat:10.1.0:milestone4:*:*:*:*:*:*",
        "cpe:2.3:a:apache:tomcat:10.1.0:milestone5:*:*:*:*:*:*",
        "cpe:2.3:a:apache:tomcat:10.1.0:milestone6:*:*:*:*:*:*",
        "cpe:2.3:a:apache:tomcat:10.1.0:milestone7:*:*:*:*:*:*",
        "cpe:2.3:a:apache:tomcat:10.1.0:milestone8:*:*:*:*:*:*",
        "cpe:2.3:a:apache:tomcat:10.1.0:milestone9:*:*:*:*:*:*",
        "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
        "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
    ],
    "extracted_events": [
        {
            "introduced": "8.5.0"
        },
        {
            "last_affected": "8.5.77"
        },
        {
            "introduced": "9.0.0"
        },
        {
            "last_affected": "9.0.60"
        },
        {
            "introduced": "10.0.0"
        },
        {
            "last_affected": "10.0.18"
        },
        {
            "introduced": "0"
        },
        {
            "last_affected": "10.1.0-milestone1"
        },
        {
            "last_affected": "10.1.0-milestone10"
        },
        {
            "last_affected": "10.1.0-milestone11"
        },
        {
            "last_affected": "10.1.0-milestone12"
        },
        {
            "last_affected": "10.1.0-milestone2"
        },
        {
            "last_affected": "10.1.0-milestone3"
        },
        {
            "last_affected": "10.1.0-milestone4"
        },
        {
            "last_affected": "10.1.0-milestone5"
        },
        {
            "last_affected": "10.1.0-milestone6"
        },
        {
            "last_affected": "10.1.0-milestone7"
        },
        {
            "last_affected": "10.1.0-milestone8"
        },
        {
            "last_affected": "10.1.0-milestone9"
        },
        {
            "last_affected": "10.0"
        },
        {
            "last_affected": "11.0"
        }
    ]
}

Affected versions

10.*
10.0.0
10.0.18
10.1.0-M1
10.1.0-M10
10.1.0-M11
10.1.0-M12
10.1.0-M2
10.1.0-M3
10.1.0-M4
10.1.0-M5
10.1.0-M6
10.1.0-M7
10.1.0-M8
10.1.0-M9
11.*
11.0.0
8.*
8.5.77
9.*
9.0.60

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-43980.json"