ALASTOMCAT8.5-2024-019

Related Vulnerabilities: CVE-2024-23672   CVE-2024-24549  

Denial of Service via incomplete cleanup vulnerability in Apache Tomcat. It was possible for WebSocket clients to keep WebSocket connections open leading to increased resource consumption.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M16, from 10.1.0-M1 through 10.1.18, from 9.0.0-M1 through 9.0.85, from 8.5.0 through 8.5.98. Users are recommended to upgrade to version 11.0.0-M17, 10.1.19, 9.0.86 or 8.5.99 which fix the issue. (CVE-2024-23672) Denial of Service due to improper input validation vulnerability for HTTP/2 requests in Apache Tomcat. When processing an HTTP/2 request, if the request exceeded any of the configured limits for headers, the associated HTTP/2 stream was not reset until after all of the headers had been processed.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M16, from 10.1.0-M1 through 10.1.18, from 9.0.0-M1 through 9.0.85, from 8.5.0 through 8.5.98. Users are recommended to upgrade to version 11.0.0-M17, 10.1.19, 9.0.86 or 8.5.99 which fix the issue. (CVE-2024-24549)

ALASTOMCAT8.5-2024-019


Amazon Linux 2 Security Advisory: ALASTOMCAT8.5-2024-019
Advisory Release Date: 2024-04-10 22:27 Pacific
Advisory Updated Date: 2024-04-15 12:00 Pacific
Severity: Important

Issue Overview:

Denial of Service via incomplete cleanup vulnerability in Apache Tomcat. It was possible for WebSocket clients to keep WebSocket connections open leading to increased resource consumption.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M16, from 10.1.0-M1 through 10.1.18, from 9.0.0-M1 through 9.0.85, from 8.5.0 through 8.5.98.

Users are recommended to upgrade to version 11.0.0-M17, 10.1.19, 9.0.86 or 8.5.99 which fix the issue. (CVE-2024-23672)

Denial of Service due to improper input validation vulnerability for HTTP/2 requests in Apache Tomcat. When processing an HTTP/2 request, if the request exceeded any of the configured limits for headers, the associated HTTP/2 stream was not reset until after all of the headers had been processed.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M16, from 10.1.0-M1 through 10.1.18, from 9.0.0-M1 through 9.0.85, from 8.5.0 through 8.5.98.

Users are recommended to upgrade to version 11.0.0-M17, 10.1.19, 9.0.86 or 8.5.99 which fix the issue. (CVE-2024-24549)


Affected Packages:

tomcat


Note:

This advisory is applicable to Amazon Linux 2 - Tomcat8.5 Extra. Visit this page to learn more about Amazon Linux 2 (AL2) Extras and this FAQ section for the difference between AL2 Core and AL2 Extras advisories.


Issue Correction:
Run yum update tomcat to update your system.

New Packages:
noarch:
    tomcat-8.5.100-1.amzn2.0.1.noarch
    tomcat-admin-webapps-8.5.100-1.amzn2.0.1.noarch
    tomcat-docs-webapp-8.5.100-1.amzn2.0.1.noarch
    tomcat-javadoc-8.5.100-1.amzn2.0.1.noarch
    tomcat-jsvc-8.5.100-1.amzn2.0.1.noarch
    tomcat-jsp-2.3-api-8.5.100-1.amzn2.0.1.noarch
    tomcat-lib-8.5.100-1.amzn2.0.1.noarch
    tomcat-servlet-3.1-api-8.5.100-1.amzn2.0.1.noarch
    tomcat-el-3.0-api-8.5.100-1.amzn2.0.1.noarch
    tomcat-webapps-8.5.100-1.amzn2.0.1.noarch

src:
    tomcat-8.5.100-1.amzn2.0.1.src