CVE-2021-42340

NameCVE-2021-42340
DescriptionThe fix for bug 63362 present in Apache Tomcat 10.1.0-M1 to 10.1.0-M5, 10.0.0-M1 to 10.0.11, 9.0.40 to 9.0.53 and 8.5.60 to 8.5.71 introduced a memory leak. The object introduced to collect metrics for HTTP upgrade connections was not released for WebSocket connections once the connection was closed. This created a memory leak that, over time, could lead to a denial of service via an OutOfMemoryError.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDSA-5009-1
NVD severitymedium

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
tomcat8 (PTS)stretch8.5.54-0+deb9u1fixed
stretch (security)8.5.54-0+deb9u8fixed
tomcat9 (PTS)buster9.0.31-1~deb10u5fixed
buster (security)9.0.31-1~deb10u6fixed
bullseye9.0.43-2~deb11u1vulnerable
bullseye (security)9.0.43-2~deb11u3fixed
bookworm, sid9.0.55-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
tomcat8sourcestretch(not affected)
tomcat8source(unstable)(unfixed)
tomcat9sourcebuster(not affected)
tomcat9sourcebullseye9.0.43-2~deb11u3DSA-5009-1
tomcat9source(unstable)9.0.54-1

Notes

[buster] - tomcat9 <not-affected> (Vulnerable code introduced later)
[stretch] - tomcat8 <not-affected> (Vulnerable code introduced later)
https://www.openwall.com/lists/oss-security/2021/10/14/1
https://github.com/apache/tomcat/commit/80f1438ec45e77a07b96419808971838d259eb47 (9.0.54)
https://github.com/apache/tomcat/commit/d27535bdee95d252418201eb21e9d29476aa6b6a (8.5.72)
Fix for https://bz.apache.org/bugzilla/show_bug.cgi?id=63362 introduced the memory leak.

Search for package or bug name: Reporting problems