[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247974

 
 

909

 
 

194654

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2017-822 ---- tomcat7 tomcat8

ID: oval:org.secpod.oval:def:1600690Date: (C)2017-04-21   (M)2023-12-20
Class: PATCHFamily: unix




Incorrect handling of pipelined requests when send file was usedA bug in the handling of the pipelined requests in Apache Tomcat 9.0.0.M1 to 9.0.0.M18, 8.5.0 to 8.5.12, 8.0.0.RC1 to 8.0.42, 7.0.0 to 7.0.76, and 6.0.0 to 6.0.52, when send file was used, results in the pipelined request being lost when send file processing of the previous request completed. This could result in responses appearing to be sent for the wrong request. For example, a user agent that sent requests A, B and C could see the correct response for request A, the response for request C for request B and no response for request C. Calls to application listeners did not use the appropriate facade objectWhile investigating bug 60718, it was noticed that some calls to application listeners in Apache Tomcat 9.0.0.M1 to 9.0.0.M17, 8.5.0 to 8.5.11, 8.0.0.RC1 to 8.0.41, and 7.0.0 to 7.0.75 did not use the appropriate facade object. When running an untrusted application under a SecurityManager, it was therefore possible for that untrusted application to retain a reference to the request or response object and thereby access and/or modify information associated with another web application

Platform:
Amazon Linux AMI
Product:
tomcat7
tomcat8
Reference:
ALAS-2017-822
CVE-2017-5647
CVE-2017-5648
CVE    2
CVE-2017-5647
CVE-2017-5648
CPE    3
cpe:/o:amazon:linux
cpe:/a:apache:tomcat8
cpe:/a:apache:tomcat7

© SecPod Technologies