Amazon Linux 2023 Security Advisory: ALAS-2024-577
Advisory Release Date: 2024-03-27 22:12 Pacific
Advisory Updated Date: 2024-03-27 22:12 Pacific
Denial of Service via incomplete cleanup vulnerability in Apache Tomcat. It was possible for WebSocket clients to keep WebSocket connections open leading to increased resource consumption.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M16, from 10.1.0-M1 through 10.1.18, from 9.0.0-M1 through 9.0.85, from 8.5.0 through 8.5.98.
Users are recommended to upgrade to version 11.0.0-M17, 10.1.19, 9.0.86 or 8.5.99 which fix the issue. (CVE-2024-23672)
Denial of Service due to improper input validation vulnerability for HTTP/2 requests in Apache Tomcat. When processing an HTTP/2 request, if the request exceeded any of the configured limits for headers, the associated HTTP/2 stream was not reset until after all of the headers had been processed.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M16, from 10.1.0-M1 through 10.1.18, from 9.0.0-M1 through 9.0.85, from 8.5.0 through 8.5.98.
Users are recommended to upgrade to version 11.0.0-M17, 10.1.19, 9.0.86 or 8.5.99 which fix the issue. (CVE-2024-24549)
Affected Packages:
tomcat9
Issue Correction:
Run dnf update tomcat9 --releasever 2023.4.20240401 to update your system.
noarch:
tomcat9-webapps-9.0.87-1.amzn2023.0.2.noarch
tomcat9-docs-webapp-9.0.87-1.amzn2023.0.2.noarch
tomcat9-9.0.87-1.amzn2023.0.2.noarch
tomcat9-servlet-4.0-api-9.0.87-1.amzn2023.0.2.noarch
tomcat9-el-3.0-api-9.0.87-1.amzn2023.0.2.noarch
tomcat9-admin-webapps-9.0.87-1.amzn2023.0.2.noarch
tomcat9-jsp-2.3-api-9.0.87-1.amzn2023.0.2.noarch
tomcat9-lib-9.0.87-1.amzn2023.0.2.noarch
src:
tomcat9-9.0.87-1.amzn2023.0.2.src