Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <45b1d9ce-3088-112e-132e-bba47ad22054@apache.org>
Date: Thu, 14 Oct 2021 15:27:04 +0100
From: Mark Thomas <markt@...che.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2021-42340: Apache Tomcat: DoS via memory leak with WebSocket
 connections

The fix for bug 63362 present in Apache Tomcat 10.1.0-M1 to 10.1.0-M5, 
10.0.0-M1 to 10.0.11, 9.0.40 to 9.0.53 and 8.5.60 to 8.5.71 introduced a 
memory leak. The object introduced to collect metrics for HTTP upgrade 
connections was not released for WebSocket connections once the 
connection was closed. This created a memory leak that, over time, could 
lead to a denial of service via an OutOfMemoryError.

References:

https://lists.apache.org/thread.html/r83a35be60f06aca2065f188ee542b9099695d57ced2e70e0885f905c%40%3Cannounce.tomcat.apache.org%3E

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.