Description
Apache Tomcat 8.5.0 to 8.5.63, 9.0.0-M1 to 9.0.43 and 10.0.0-M1 to 10.0.2 did not properly validate incoming TLS packets. When Tomcat was configured to use NIO+OpenSSL or NIO2+OpenSSL for TLS, a specially crafted packet could be used to trigger an infinite loop resulting in a denial of service.
Remediation
References
https://lists.apache.org/thread.html/rccdef0349fdf4fb73a4e4403095446d7fe6264e0a58e2df5c6799434%40%3Cannounce.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/09/msg00012.html
https://security.netapp.com/advisory/ntap-20211008-0005/
https://www.debian.org/security/2021/dsa-4986
https://lists.apache.org/thread.html/rb4de81ac647043541a32881099aa6eb5a23f1b7fd116f713f8ab9dbe%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6b6b674e3f168dd010e67dbe6848b866e2acf26371452fdae313b98a%40%3Cusers.tomcat.apache.org%3E
Related Vulnerabilities
CVE-2022-34815 Vulnerability in maven package org.jenkins-ci.plugins:rrod
CVE-2022-36097 Vulnerability in maven package org.xwiki.platform:xwiki-platform-attachment-ui
CVE-2023-46497 Vulnerability in npm package @evershop/evershop
CVE-2022-34783 Vulnerability in maven package org.jenkins-ci.plugins:plot
CVE-2022-33140 Vulnerability in maven package org.apache.nifi.registry:nifi-registry-framework