-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.apache.tomcat:tomcat | maven | < 6.0.40 | 6.0.40 |
| org.apache.tomcat:tomcat | maven | >= 7.0.0, < 7.0.54 | 7.0.54 |
| org.apache.tomcat:tomcat | maven | >= 8.0.0, < 8.0.6 | 8.0.6 |
The commit diff shows critical changes to the parseLong method in Ascii.java, introducing overflow checks using OVERFLOW_LIMIT. The CVE description explicitly references improper Content-Length handling in this file, and the added test cases validate() overflow scenarios. The pre-patch code used unsafe 'm = n*10 + c' without proper overflow validation, making this function the clear vulnerability source.