CVE-2021-25122

NameCVE-2021-25122
DescriptionWhen responding to new h2c connection requests, Apache Tomcat versions 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41 and 8.5.0 to 8.5.61 could duplicate request headers and a limited amount of request body from one request to another meaning user A and user B could both see the results of user A's request.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-2594-1, DSA-4891-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
tomcat9 (PTS)bullseye (security), bullseye9.0.43-2~deb11u10fixed
bookworm9.0.70-2fixed
sid, trixie9.0.95-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
tomcat7sourcestretch(not affected)
tomcat7source(unstable)(unfixed)
tomcat8sourcestretch8.5.54-0+deb9u6DLA-2594-1
tomcat8source(unstable)(unfixed)
tomcat9sourcebuster9.0.31-1~deb10u4DSA-4891-1
tomcat9source(unstable)9.0.43-1

Notes

[stretch] - tomcat7 <not-affected> (Vulnerable code introduced later)
https://www.openwall.com/lists/oss-security/2021/03/01/1
https://github.com/apache/tomcat/commit/d47c20a776e8919eaca8da9390a32bc8bf8210b1 (9.0.43)
https://github.com/apache/tomcat/commit/bb0e7c1e0d737a0de7d794572517bce0e91d30fa (8.5.63)

Search for package or bug name: Reporting problems