The fix for bug 63362 present in Apache Tomcat 10.1.0-M1 to 10.1.0-M5, 10.0.0-M1 to 10.0.11, 9.0.40 to 9.0.53 and 8.5.60 to 8.5.71 introduced a memory leak. The object introduced to collect metrics for HTTP upgrade connections was not released for WebSocket connections once the connection was closed. This created a memory leak that, over time, could lead to a denial of service via an OutOfMemoryError.
Advisories
Source ID Title
Debian DSA Debian DSA DSA-5009-1 tomcat9 security update
EUVD EUVD EUVD-2021-2266 The fix for bug 63362 present in Apache Tomcat 10.1.0-M1 to 10.1.0-M5, 10.0.0-M1 to 10.0.11, 9.0.40 to 9.0.53 and 8.5.60 to 8.5.71 introduced a memory leak. The object introduced to collect metrics for HTTP upgrade connections was not released for WebSocket connections once the connection was closed. This created a memory leak that, over time, could lead to a denial of service via an OutOfMemoryError.
Github GHSA Github GHSA GHSA-wph7-x527-w3h5 Missing Release of Resource after Effective Lifetime in Apache Tomcat
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2024-08-04T03:30:38.354Z

Reserved: 2021-10-13T00:00:00

Link: CVE-2021-42340

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-10-14T20:15:09.060

Modified: 2024-11-21T06:27:38.363

Link: CVE-2021-42340

cve-icon Redhat

Severity : Important

Publid Date: 2021-10-14T00:00:00Z

Links: CVE-2021-42340 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses