Amazon Linux 1 Security Advisory: ALAS-2024-1941
Advisory Release Date: 2024-06-19 18:46 Pacific
Advisory Updated Date: 2024-06-24 14:01 Pacific
Denial of Service via incomplete cleanup vulnerability in Apache Tomcat. It was possible for WebSocket clients to keep WebSocket connections open leading to increased resource consumption.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M16, from 10.1.0-M1 through 10.1.18, from 9.0.0-M1 through 9.0.85, from 8.5.0 through 8.5.98.
Users are recommended to upgrade to version 11.0.0-M17, 10.1.19, 9.0.86 or 8.5.99 which fix the issue. (CVE-2024-23672)
Denial of Service due to improper input validation vulnerability for HTTP/2 requests in Apache Tomcat. When processing an HTTP/2 request, if the request exceeded any of the configured limits for headers, the associated HTTP/2 stream was not reset until after all of the headers had been processed.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M16, from 10.1.0-M1 through 10.1.18, from 9.0.0-M1 through 9.0.85, from 8.5.0 through 8.5.98.
Users are recommended to upgrade to version 11.0.0-M17, 10.1.19, 9.0.86 or 8.5.99 which fix the issue. (CVE-2024-24549)
Affected Packages:
tomcat8
Issue Correction:
Run yum update tomcat8 to update your system.
noarch:
tomcat8-log4j-8.5.99-1.97.amzn1.noarch
tomcat8-docs-webapp-8.5.99-1.97.amzn1.noarch
tomcat8-admin-webapps-8.5.99-1.97.amzn1.noarch
tomcat8-8.5.99-1.97.amzn1.noarch
tomcat8-lib-8.5.99-1.97.amzn1.noarch
tomcat8-webapps-8.5.99-1.97.amzn1.noarch
tomcat8-javadoc-8.5.99-1.97.amzn1.noarch
tomcat8-el-3.0-api-8.5.99-1.97.amzn1.noarch
tomcat8-jsp-2.3-api-8.5.99-1.97.amzn1.noarch
tomcat8-servlet-3.1-api-8.5.99-1.97.amzn1.noarch
src:
tomcat8-8.5.99-1.97.amzn1.src