QID 354037

Date Published: 2022-08-08

QID 354037: Amazon Linux Security Advisory for tomcat8 : ALAS-2022-1627

A flaw was found in the tomcat package.
When a web application sends a websocket message concurrently with the websocket connection closing, the application may continue to use the socket after it has been closed.
In this case, the error handling triggered could cause the pooled object to be placed in the pool twice.
This issue results in subsequent connections using the same object concurrently, which causes data to be potentially returned to the wrong user or application stability issues. (
( CVE-2022-25762) the documentation of apache tomcat 10.1.0-m1 to 10.1.0-m14, 10.0.0-m1 to 10.0.20, 9.0.13 to 9.0.62 and 8.5.38 to 8.5.78 for the encryptinterceptor incorrectly stated it enabled tomcat clustering to run over an untrusted network.
This was not correct.
While the encryptinterceptor does provide confidentiality and integrity protection, it does not protect against all risks associated with running over any untrusted network, particularly dos risks. (
( CVE-2022-29885)



Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as Critical - 8.6 severity.
  • CVSS V2 rated as High - 7.5 severity.
  • Solution
    Please refer to Amazon advisory: ALAS-2022-1627 for affected packages and patching details, or update with your package manager.
    Vendor References

    CVEs related to QID 354037

    Software Advisories
    Advisory ID Software Component Link
    ALAS-2022-1627 Amazon Linux URL Logo alas.aws.amazon.com/ALAS-2022-1627.html