{"id":"CVE-2021-43980","details":"The simplified implementation of blocking reads and writes introduced in Tomcat 10 and back-ported to Tomcat 9.0.47 onwards exposed a long standing (but extremely hard to trigger) concurrency bug in Apache Tomcat 10.1.0 to 10.1.0-M12, 10.0.0-M1 to 10.0.18, 9.0.0-M1 to 9.0.60 and 8.5.0 to 8.5.77 that could cause client connections to share an Http11Processor instance resulting in responses, or part responses, to be received by the wrong client.","aliases":["BIT-tomcat-2021-43980","GHSA-jx7c-7mj5-9438"],"modified":"2026-05-15T12:04:38.766153754Z","published":"2022-09-28T14:15:09.880Z","related":["SUSE-SU-2022:4009-1","SUSE-SU-2022:4221-1","SUSE-SU-2022:4257-1","SUSE-SU-2026:1058-1","openSUSE-SU-2024:12534-1","openSUSE-SU-2024:13441-1"],"database_specific":{"unresolved_ranges":[{"vendor_product":"debian:debian_linux","source":"CPE_FIELD","extracted_events":[{"last_affected":"10.0"},{"last_affected":"11.0"}],"cpes":["cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"]}]},"references":[{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2022/09/28/1"},{"type":"ADVISORY","url":"https://lists.apache.org/thread/3jjqbsp6j88b198x5rmg99b1qr8ht3g3"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2022/10/msg00029.html"},{"type":"ADVISORY","url":"https://www.debian.org/security/2022/dsa-5265"}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}]}