CVE-2024-34750: Apache Tomcat - Denial of Service
(updated )
Improper Handling of Exceptional Conditions, Uncontrolled Resource Consumption vulnerability in Apache Tomcat. When processing an HTTP/2 stream, Tomcat did not handle some cases of excessive HTTP headers correctly. This led to a miscounting of active HTTP/2 streams which in turn led to the use of an incorrect infinite timeout which allowed connections to remain open which should have been closed.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M20, from 10.1.0-M1 through 10.1.24, from 9.0.0-M1 through 9.0.89.
Users are recommended to upgrade to version 11.0.0-M21, 10.1.25 or 9.0.90, which fixes the issue.
References
- github.com/advisories/GHSA-wm9w-rjj3-j356
- github.com/apache/tomcat
- github.com/apache/tomcat/commit/2344a4c0d03e307ba6b8ab6dc8b894cc8bac63f2
- github.com/apache/tomcat/commit/2afae300c9ac9c0e516e2e9de580847d925365c3
- github.com/apache/tomcat/commit/9fec9a82887853402833a80b584e3762c7423f5f
- lists.apache.org/thread/4kqf0bc9gxymjc2x7v3p7dvplnl77y8l
- nvd.nist.gov/vuln/detail/CVE-2024-34750
- tomcat.apache.org/security-10.html
- tomcat.apache.org/security-11.html
- tomcat.apache.org/security-9.html
Detect and mitigate CVE-2024-34750 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →