Description
The fix for bug 63362 present in Apache Tomcat 10.1.0-M1 to 10.1.0-M5, 10.0.0-M1 to 10.0.11, 9.0.40 to 9.0.53 and 8.5.60 to 8.5.71 introduced a memory leak. The object introduced to collect metrics for HTTP upgrade connections was not released for WebSocket connections once the connection was closed. This created a memory leak that, over time, could lead to a denial of service via an OutOfMemoryError.
Remediation
References
https://lists.apache.org/thread.html/r83a35be60f06aca2065f188ee542b9099695d57ced2e70e0885f905c%40%3Cannounce.tomcat.apache.org%3E
https://www.debian.org/security/2021/dsa-5009
https://security.netapp.com/advisory/ntap-20211104-0001/
https://www.oracle.com/security-alerts/cpujan2022.html
https://kc.mcafee.com/corporate/index?page=content&id=SB10379
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujul2022.html
https://security.gentoo.org/glsa/202208-34
https://lists.apache.org/thread.html/r8097a2d1550aa78e585fc77e602b9046e6d4099d8d132497c5387784%40%3Ccommits.myfaces.apache.org%3E
Related Vulnerabilities
CVE-2021-39148 Vulnerability in maven package com.thoughtworks.xstream:xstream
CVE-2021-21162 Vulnerability in maven package org.webjars.npm:electron
CVE-2022-33987 Vulnerability in maven package org.webjars.npm:got
CVE-2023-49798 Vulnerability in npm package @openzeppelin/contracts-upgradeable
CVE-2023-33948 Vulnerability in maven package com.liferay.portal:release.portal.bom