CVE-2018-8034
Description
The host name verification when using TLS with the WebSocket client was missing. It is now enabled by default. Versions Affected: Apache Tomcat 9.0.0.M1 to 9.0.9, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, and 7.0.35 to 7.0.88.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Apache Tomcat WebSocket client TLS host name verification was missing, enabling man-in-the-middle attacks; fixed in 9.0.10, 8.5.32, 8.0.53, 7.0.89.
Vulnerability
The Apache Tomcat WebSocket client, when configured to use TLS, did not perform host name verification against the server certificate. This affects Tomcat versions 9.0.0.M1 to 9.0.9, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, and 7.0.35 to 7.0.88 [1][2][3][4]. The missing check allowed any valid certificate presented by a server to be accepted, even if the common name (CN) or subject alternative names (SANs) did not match the intended host name.
Exploitation
An attacker positioned between the Tomcat WebSocket client and the legitimate server (a man-in-the-middle) could present a TLS certificate issued by a trusted certificate authority for any domain. If the client trusts the root CA that signed the attacker's certificate, the TLS handshake succeeds without host name verification, and the attacker can then intercept or modify WebSocket traffic. No prior authentication or special user interaction beyond establishing a TLS WebSocket connection is required.
Impact
Successful exploitation permits a man-in-the-middle to read, modify, or inject data into the WebSocket communication stream. This breaks the confidentiality and integrity guarantees that TLS is meant to provide, potentially exposing sensitive application data or allowing command injection if the WebSocket channel carries control messages.
Mitigation
The host name verification is now enabled by default. Fixed versions are Apache Tomcat 9.0.10, 8.5.32, 8.0.53, and 7.0.89 [1][2][3][4]. Users unable to upgrade immediately can configure a custom SSLContext with a host name verifier, but upgrading is the recommended approach.
AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.apache.tomcat.embed:tomcat-embed-coreMaven | >= 9.0.0, < 9.0.10 | 9.0.10 |
org.apache.tomcat.embed:tomcat-embed-coreMaven | >= 8.5.0, < 8.5.32 | 8.5.32 |
org.apache.tomcat.embed:tomcat-embed-coreMaven | >= 8.0.0, < 8.0.53 | 8.0.53 |
org.apache.tomcat.embed:tomcat-embed-coreMaven | >= 7.0.35, < 7.0.90 | 7.0.90 |
Affected products
35- ghsa-coords34 versionspkg:maven/org.apache.tomcat.embed/tomcat-embed-corepkg:rpm/almalinux/apache-commons-collectionspkg:rpm/almalinux/apache-commons-langpkg:rpm/almalinux/bea-stax-apipkg:rpm/almalinux/glassfish-fastinfosetpkg:rpm/almalinux/glassfish-jaxb-apipkg:rpm/almalinux/glassfish-jaxb-corepkg:rpm/almalinux/glassfish-jaxb-runtimepkg:rpm/almalinux/glassfish-jaxb-txw2pkg:rpm/almalinux/jackson-module-jaxb-annotationspkg:rpm/almalinux/jakarta-commons-httpclientpkg:rpm/almalinux/javassistpkg:rpm/almalinux/javassist-javadocpkg:rpm/almalinux/python3-nsspkg:rpm/almalinux/python-nss-docpkg:rpm/almalinux/relaxngDatatypepkg:rpm/almalinux/slf4jpkg:rpm/almalinux/slf4j-jdk14pkg:rpm/almalinux/stax-expkg:rpm/almalinux/velocitypkg:rpm/almalinux/xalan-j2pkg:rpm/almalinux/xerces-j2pkg:rpm/almalinux/xml-commons-apispkg:rpm/almalinux/xml-commons-resolverpkg:rpm/almalinux/xmlstreambufferpkg:rpm/almalinux/xsompkg:rpm/opensuse/tomcat10&distro=openSUSE%20Tumbleweedpkg:rpm/opensuse/tomcat&distro=openSUSE%20Tumbleweedpkg:rpm/suse/tomcat&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Web%20and%20Scripting%2015pkg:rpm/suse/tomcat&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/tomcat&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3pkg:rpm/suse/tomcat&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/tomcat&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/tomcat&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3
>= 9.0.0, < 9.0.10+ 33 more
- (no CPE)range: >= 9.0.0, < 9.0.10
- (no CPE)range: < 3.2.2-10.module_el8.5.0+2577+9e95fe00
- (no CPE)range: < 2.6-21.module_el8.5.0+150+5f0dbea0
- (no CPE)range: < 1.2.0-16.module_el8.5.0+150+5f0dbea0
- (no CPE)range: < 1.2.13-9.module_el8.5.0+150+5f0dbea0
- (no CPE)range: < 2.2.12-8.module_el8.5.0+2577+9e95fe00
- (no CPE)range: < 2.2.11-11.module_el8.5.0+150+5f0dbea0
- (no CPE)range: < 2.2.11-11.module_el8.5.0+2577+9e95fe00
- (no CPE)range: < 2.2.11-11.module_el8.5.0+2577+9e95fe00
- (no CPE)range: < 2.7.6-4.module_el8.5.0+150+5f0dbea0
- (no CPE)range: < 1:3.1-28.module_el8.5.0+2577+9e95fe00
- (no CPE)range: < 3.18.1-8.module_el8.5.0+150+5f0dbea0
- (no CPE)range: < 3.18.1-8.module_el8.5.0+2577+9e95fe00
- (no CPE)range: < 1.0.1-10.module_el8.5.0+150+5f0dbea0.alma
- (no CPE)range: < 1.0.1-10.module_el8.5.0+150+5f0dbea0.alma
- (no CPE)range: < 2011.1-7.module_el8.5.0+2577+9e95fe00
- (no CPE)range: < 1.7.25-4.module_el8.6.0+2752+f1f3449e
- (no CPE)range: < 1.7.25-4.module_el8.5.0+2577+9e95fe00
- (no CPE)range: < 1.7.7-8.module_el8.5.0+150+5f0dbea0
- (no CPE)range: < 1.7-24.module_el8.5.0+150+5f0dbea0
- (no CPE)range: < 2.7.1-38.module_el8.5.0+150+5f0dbea0
- (no CPE)range: < 2.11.0-34.module_el8.5.0+150+5f0dbea0
- (no CPE)range: < 1.4.01-25.module_el8.5.0+150+5f0dbea0
- (no CPE)range: < 1.2-26.module_el8.5.0+2577+9e95fe00
- (no CPE)range: < 1.5.4-8.module_el8.5.0+2577+9e95fe00
- (no CPE)range: < 0-19.20110809svn.module_el8.5.0+150+5f0dbea0
- (no CPE)range: < 10.1.14-1.1
- (no CPE)range: < 9.0.36-8.4
- (no CPE)range: < 9.0.10-3.7.1
- (no CPE)range: < 8.0.53-10.35.1
- (no CPE)range: < 8.0.53-29.13.1
- (no CPE)range: < 7.0.90-7.23.1
- (no CPE)range: < 8.0.53-10.35.1
- (no CPE)range: < 8.0.53-29.13.1
- Apache Software Foundation/Apache Tomcatv5Range: 9.0.0.M1 to 9.0.9
Patches
22c522795166cEnable host name verification for secure WebSocket client connections by default.
3 files changed · +31 −7
java/org/apache/tomcat/websocket/WsWebSocketContainer.java+12 −3 modified@@ -53,6 +53,7 @@ import javax.net.ssl.SSLContext; import javax.net.ssl.SSLEngine; import javax.net.ssl.SSLException; +import javax.net.ssl.SSLParameters; import javax.net.ssl.TrustManagerFactory; import javax.websocket.ClientEndpoint; import javax.websocket.ClientEndpointConfig; @@ -369,7 +370,7 @@ private Session connectToServerRecursive(Endpoint endpoint, // Regardless of whether a non-secure wrapper was created for a // proxy CONNECT, need to use TLS from this point on so wrap the // original AsynchronousSocketChannel - SSLEngine sslEngine = createSSLEngine(userProperties); + SSLEngine sslEngine = createSSLEngine(userProperties, host, port); channel = new AsyncChannelWrapperSecure(socketChannel, sslEngine); } else if (channel == null) { // Only need to wrap as this point if it wasn't wrapped to process a @@ -931,7 +932,7 @@ private String readLine(ByteBuffer response) { } - private SSLEngine createSSLEngine(Map<String,Object> userProperties) + private SSLEngine createSSLEngine(Map<String,Object> userProperties, String host, int port) throws DeploymentException { try { @@ -979,7 +980,7 @@ private SSLEngine createSSLEngine(Map<String,Object> userProperties) } } - SSLEngine engine = sslContext.createSSLEngine(); + SSLEngine engine = sslContext.createSSLEngine(host, port); String sslProtocolsValue = (String) userProperties.get(SSL_PROTOCOLS_PROPERTY); @@ -989,6 +990,14 @@ private SSLEngine createSSLEngine(Map<String,Object> userProperties) engine.setUseClientMode(true); + // Enable host verification + // Start with current settings (returns a copy) + SSLParameters sslParams = engine.getSSLParameters(); + // Use HTTPS since WebSocket starts over HTTP(S) + sslParams.setEndpointIdentificationAlgorithm("HTTPS"); + // Write the parameters back + engine.setSSLParameters(sslParams); + return engine; } catch (Exception e) { throw new DeploymentException(sm.getString(
webapps/docs/changelog.xml+4 −0 modified@@ -164,6 +164,10 @@ <code>DecodeException</code> instead of throwing <code>ArrayIndexOutOfBoundsException</code>. (kfujino) </fix> + <fix> + Enable host name verification when using TLS with the WebSocket client. + (markt) + </fix> </changelog> </subsection> <subsection name="Web applications">
webapps/docs/web-socket-howto.xml+15 −4 modified@@ -148,10 +148,21 @@ implement its own timeout mechanism to handle these cases.</p> <li><code>org.apache.tomcat.websocket.SSL_TRUSTSTORE_PWD</code></li> </ul> <p>The default truststore password is <code>changeit</code>.</p> - <p>If the <code>org.apache.tomcat.websocket.SSL_CONTEXT</code> property is - set then the <code>org.apache.tomcat.websocket.SSL_TRUSTSTORE</code> and - <code>org.apache.tomcat.websocket.SSL_TRUSTSTORE_PWD</code> properties - will be ignored.</p> + +<p>If the <code>org.apache.tomcat.websocket.SSL_CONTEXT</code> property is + set then the <code>org.apache.tomcat.websocket.SSL_TRUSTSTORE</code> and + <code>org.apache.tomcat.websocket.SSL_TRUSTSTORE_PWD</code> properties + will be ignored.</p> + +<p>For secure server end points, host name verification is enabled by default. + To bypass this verification (not recommended), it is necessary to provide a + custom <code>SSLContext</code> via the + <code>org.apache.tomcat.websocket.SSL_CONTEXT</code> user property. The + custom <code>SSLContext</code> must be configured with a custom + <code>TrustManager</code> that extends + <code>javax.net.ssl.X509ExtendedTrustManager</code>. The desired verification + (or lack of verification) can then be controlled by appropriate + implementations of the individual abstract methods.</p> <p>When using the WebSocket client to connect to server endpoints, the number of HTTP redirects that the client will follow is controlled by the
2835bb4e030cEnable host name verification for secure WebSocket client connections by
3 files changed · +31 −7
java/org/apache/tomcat/websocket/WsWebSocketContainer.java+12 −3 modified@@ -52,6 +52,7 @@ import javax.net.ssl.SSLContext; import javax.net.ssl.SSLEngine; import javax.net.ssl.SSLException; +import javax.net.ssl.SSLParameters; import javax.net.ssl.TrustManagerFactory; import javax.websocket.ClientEndpoint; import javax.websocket.ClientEndpointConfig; @@ -328,7 +329,7 @@ private Session connectToServerRecursive(Endpoint endpoint, // Regardless of whether a non-secure wrapper was created for a // proxy CONNECT, need to use TLS from this point on so wrap the // original AsynchronousSocketChannel - SSLEngine sslEngine = createSSLEngine(userProperties); + SSLEngine sslEngine = createSSLEngine(userProperties, host, port); channel = new AsyncChannelWrapperSecure(socketChannel, sslEngine); } else if (channel == null) { // Only need to wrap as this point if it wasn't wrapped to process a @@ -866,7 +867,7 @@ private String readLine(ByteBuffer response) { } - private SSLEngine createSSLEngine(Map<String,Object> userProperties) + private SSLEngine createSSLEngine(Map<String,Object> userProperties, String host, int port) throws DeploymentException { try { @@ -904,7 +905,7 @@ private SSLEngine createSSLEngine(Map<String,Object> userProperties) } } - SSLEngine engine = sslContext.createSSLEngine(); + SSLEngine engine = sslContext.createSSLEngine(host, port); String sslProtocolsValue = (String) userProperties.get(Constants.SSL_PROTOCOLS_PROPERTY); @@ -914,6 +915,14 @@ private SSLEngine createSSLEngine(Map<String,Object> userProperties) engine.setUseClientMode(true); + // Enable host verification + // Start with current settings (returns a copy) + SSLParameters sslParams = engine.getSSLParameters(); + // Use HTTPS since WebSocket starts over HTTP(S) + sslParams.setEndpointIdentificationAlgorithm("HTTPS"); + // Write the parameters back + engine.setSSLParameters(sslParams); + return engine; } catch (Exception e) { throw new DeploymentException(sm.getString(
webapps/docs/changelog.xml+4 −0 modified@@ -277,6 +277,10 @@ Improve the handling of exceptions during TLS handshakes for the WebSocket client. (markt) </fix> + <fix> + Enable host name verification when using TLS with the WebSocket client. + (markt) + </fix> </changelog> </subsection> <subsection name="Web applications">
webapps/docs/web-socket-howto.xml+15 −4 modified@@ -110,10 +110,21 @@ <li><code>org.apache.tomcat.websocket.SSL_TRUSTSTORE_PWD</code></li> </ul> <p>The default truststore password is <code>changeit</code>.</p> - <p>If the <code>org.apache.tomcat.websocket.SSL_CONTEXT</code> property is - set then the <code>org.apache.tomcat.websocket.SSL_TRUSTSTORE</code> and - <code>org.apache.tomcat.websocket.SSL_TRUSTSTORE_PWD</code> properties - will be ignored.</p> + +<p>If the <code>org.apache.tomcat.websocket.SSL_CONTEXT</code> property is + set then the <code>org.apache.tomcat.websocket.SSL_TRUSTSTORE</code> and + <code>org.apache.tomcat.websocket.SSL_TRUSTSTORE_PWD</code> properties + will be ignored.</p> + +<p>For secure server end points, host name verification is enabled by default. + To bypass this verification (not recommended), it is necessary to provide a + custom <code>SSLContext</code> via the + <code>org.apache.tomcat.websocket.SSL_CONTEXT</code> user property. The + custom <code>SSLContext</code> must be configured with a custom + <code>TrustManager</code> that extends + <code>javax.net.ssl.X509ExtendedTrustManager</code>. The desired verification + (or lack of verification) can then be controlled by appropriate + implementations of the individual abstract methods.</p> <p>When using the WebSocket client to connect to server endpoints, the number of HTTP redirects that the client will follow is controlled by the
Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
67- access.redhat.com/errata/RHSA-2019:0130ghsavendor-advisoryx_refsource_REDHATWEB
- access.redhat.com/errata/RHSA-2019:0131ghsavendor-advisoryx_refsource_REDHATWEB
- access.redhat.com/errata/RHSA-2019:0450ghsavendor-advisoryx_refsource_REDHATWEB
- access.redhat.com/errata/RHSA-2019:0451ghsavendor-advisoryx_refsource_REDHATWEB
- access.redhat.com/errata/RHSA-2019:1159ghsavendor-advisoryx_refsource_REDHATWEB
- access.redhat.com/errata/RHSA-2019:1160ghsavendor-advisoryx_refsource_REDHATWEB
- access.redhat.com/errata/RHSA-2019:1161ghsavendor-advisoryx_refsource_REDHATWEB
- access.redhat.com/errata/RHSA-2019:1162ghsavendor-advisoryx_refsource_REDHATWEB
- access.redhat.com/errata/RHSA-2019:1529ghsavendor-advisoryx_refsource_REDHATWEB
- access.redhat.com/errata/RHSA-2019:2205ghsavendor-advisoryx_refsource_REDHATWEB
- access.redhat.com/errata/RHSA-2019:3892ghsavendor-advisoryx_refsource_REDHATWEB
- github.com/advisories/GHSA-46j3-r4pj-4835ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2018-8034ghsaADVISORY
- usn.ubuntu.com/3723-1/mitrevendor-advisoryx_refsource_UBUNTU
- www.debian.org/security/2018/dsa-4281ghsavendor-advisoryx_refsource_DEBIANWEB
- mail-archives.us.apache.org/mod_mbox/www-announce/201807.mbox/%3C20180722091057.GA70283%40minotaur.apache.org%3Eghsamailing-listx_refsource_MLISTWEB
- mail-archives.us.apache.org/mod_mbox/www-announce/201807.mbox/%3C20180722091057.GA70283@minotaur.apache.org%3EghsaWEB
- www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.htmlghsax_refsource_CONFIRMWEB
- www.securityfocus.com/bid/104895ghsavdb-entryx_refsource_BIDWEB
- www.securitytracker.com/id/1041374ghsavdb-entryx_refsource_SECTRACKWEB
- github.com/apache/tomcat/commit/2835bb4e030c1c741ed0847bb3b9c3822e4fbc8aghsaWEB
- github.com/apache/tomcat/commit/2c522795166c930741a9cecca76797bf48cb1634ghsaWEB
- lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba%40%3Cdev.tomcat.apache.org%3Eghsamailing-listx_refsource_MLISTWEB
- lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3EghsaWEB
- lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3Eghsamailing-listx_refsource_MLISTWEB
- lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3EghsaWEB
- lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3Eghsamailing-listx_refsource_MLISTWEB
- lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3EghsaWEB
- lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3Eghsamailing-listx_refsource_MLISTWEB
- lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3EghsaWEB
- lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb%40%3Cdev.tomcat.apache.org%3Eghsamailing-listx_refsource_MLISTWEB
- lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3EghsaWEB
- lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3Eghsamailing-listx_refsource_MLISTWEB
- lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3EghsaWEB
- lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3Eghsamailing-listx_refsource_MLISTWEB
- lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3EghsaWEB
- lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3Eghsamailing-listx_refsource_MLISTWEB
- lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3EghsaWEB
- lists.apache.org/thread.html/ac51944aef91dd5006b8510b0bef337adaccfe962fb90e7af9c22db4%40%3Cissues.activemq.apache.org%3Eghsamailing-listx_refsource_MLISTWEB
- lists.apache.org/thread.html/ac51944aef91dd5006b8510b0bef337adaccfe962fb90e7af9c22db4@%3Cissues.activemq.apache.org%3EghsaWEB
- lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3Eghsamailing-listx_refsource_MLISTWEB
- lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3EghsaWEB
- lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661%40%3Cdev.tomcat.apache.org%3Eghsamailing-listx_refsource_MLISTWEB
- lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3EghsaWEB
- lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04%40%3Cdev.tomcat.apache.org%3Eghsamailing-listx_refsource_MLISTWEB
- lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3Eghsamailing-listx_refsource_MLISTWEB
- lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3Eghsamailing-listx_refsource_MLISTWEB
- lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3Eghsamailing-listx_refsource_MLISTWEB
- lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3Eghsamailing-listx_refsource_MLISTWEB
- lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3EghsaWEB
- lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3Eghsamailing-listx_refsource_MLISTWEB
- lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3EghsaWEB
- lists.debian.org/debian-lts-announce/2018/07/msg00047.htmlghsamailing-listx_refsource_MLISTWEB
- lists.debian.org/debian-lts-announce/2018/09/msg00001.htmlghsamailing-listx_refsource_MLISTWEB
- security.netapp.com/advisory/ntap-20180817-0001ghsaWEB
- security.netapp.com/advisory/ntap-20180817-0001/mitrex_refsource_CONFIRM
- usn.ubuntu.com/3723-1ghsaWEB
- web.archive.org/web/20200227102810/http://www.securityfocus.com/bid/104895ghsaWEB
- web.archive.org/web/20200517032514/http://www.securitytracker.com/id/1041374ghsaWEB
- www.oracle.com/security-alerts/cpuapr2020.htmlghsax_refsource_MISCWEB
- www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.htmlghsax_refsource_MISCWEB
- www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.htmlghsax_refsource_MISCWEB
- www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.htmlghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.