Race Condition Affecting tomcat8-jsp-2.3-api package, versions <0:8.5.32-1.78.amzn1


Severity

Recommended
high

Based on Amazon Linux security rating.

Threat Intelligence

EPSS
0.32% (72nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-AMZN201803-TOMCAT8JSP23API-1715535
  • published27 Sept 2021
  • disclosed2 Aug 2018

Introduced: 2 Aug 2018

CVE-2018-8037  (opens in a new tab)
CWE-362  (opens in a new tab)

How to fix?

Upgrade Amazon-Linux:2018.03 tomcat8-jsp-2.3-api to version 0:8.5.32-1.78.amzn1 or higher.
This issue was patched in ALAS-2018-1056.

NVD Description

Note: Versions mentioned in the description apply only to the upstream tomcat8-jsp-2.3-api package and not the tomcat8-jsp-2.3-api package as distributed by Amazon-Linux. See How to fix? for Amazon-Linux:2018.03 relevant fixed versions and status.

If an async request was completed by the application at the same time as the container triggered the async timeout, a race condition existed that could result in a user seeing a response intended for a different user. An additional issue was present in the NIO and NIO2 connectors that did not correctly track the closure of the connection when an async request was completed by the application and timed out by the container at the same time. This could also result in a user seeing a response intended for another user. Versions Affected: Apache Tomcat 9.0.0.M9 to 9.0.9 and 8.5.5 to 8.5.31.

References