It was found that Tomcat 8 would keep connections open after processing requests with a large enough request body. A remote attacker could potentially use this flaw to exhaust the pool of available connections, and this would prevent any further legitimate connections to the Tomcat server.
It was found that Tomcat 8 would keep connections open after processing requests with a large enough request body. A remote attacker could potentially use this flaw to exhaust the pool of available connections, and this would prevent any further legitimate connections to the Tomcat server.
This issue has been fixed in this release.