tomcat8, tomcat9
2017-06-16 19:22
CVE-2017-5651 tomcat8
2017-04-20 05:03
2017-04-14 10:21
2017-04-14 00:03


In Apache Tomcat 9.0.0.M1 to 9.0.0.M18 and 8.5.0 to 8.5.12, the refactoring of the HTTP connectors introduced a regression in the send file processing. If the send file processing completed quickly, it was possible for the Processor to be added to the processor cache twice. This could result in the same Processor being used for multiple requests which in turn could lead to unexpected errors and/or response mix-up.

Am I vulnerable?

The constraints below list the versions that this vulnerability is patched in, and versions that are unaffected. If a patch is ready but unrealeased, then it is pending.

Or, you can just let us figure it out for you! Appcanary continously monitor your installed packages, and tell you if any of them are vulnerable.

Sign up for monitoring

Affected package information

Release Package Patched in
upstream tomcat8 8.5.11-2


Release Package Reason
precise tomcat9 DNE
tomcat8 DNE
trusty tomcat9 DNE
tomcat8 DNE
vivid/stable-phone-overlay tomcat9 DNE
tomcat8 DNE
vivid/ubuntu-core tomcat9 DNE
tomcat8 DNE
xenial tomcat9 DNE
tomcat8 not-affected
yakkety tomcat9 DNE
tomcat8 not-affected
zesty tomcat9 DNE
tomcat8 not-affected
devel tomcat9 DNE
tomcat8 not-affected

Needs Triage

Release Package Reason
upstream tomcat9 needs-triage