CVE-2022-23181

NameCVE-2022-23181
DescriptionThe fix for bug CVE-2020-9484 introduced a time of check, time of use vulnerability into Apache Tomcat 10.1.0-M1 to 10.1.0-M8, 10.0.0-M5 to 10.0.14, 9.0.35 to 9.0.56 and 8.5.55 to 8.5.73 that allowed a local attacker to perform actions with the privileges of the user that the Tomcat process is using. This issue is only exploitable when Tomcat is configured to persist sessions using the FileStore.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3160-1, DSA-5265-1, ELA-734-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
tomcat7 (PTS)jessie, jessie (lts)7.0.56-3+really7.0.109-1+deb8u6vulnerable
stretch7.0.75-1vulnerable
tomcat8 (PTS)jessie, jessie (lts)8.0.14-1+deb8u28fixed
stretch (security)8.5.54-0+deb9u8vulnerable
stretch (lts), stretch8.5.54-0+deb9u15fixed
tomcat9 (PTS)buster (security), buster, buster (lts)9.0.31-1~deb10u12fixed
bullseye (security), bullseye9.0.43-2~deb11u10fixed
bookworm9.0.70-2fixed
sid, trixie9.0.95-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
tomcat7sourcestretch(unfixed)end-of-life
tomcat7source(unstable)(unfixed)
tomcat8sourcejessie8.0.14-1+deb8u23ELA-734-1
tomcat8sourcestretch8.5.54-0+deb9u9ELA-734-1
tomcat8source(unstable)(unfixed)
tomcat9sourcebuster9.0.31-1~deb10u7DLA-3160-1
tomcat9sourcebullseye9.0.43-2~deb11u4DSA-5265-1
tomcat9source(unstable)9.0.58-1

Notes

[stretch] - tomcat8 <postponed> (Minor issue; local race condition)
https://lists.apache.org/thread/l8x62p3k19yfcb208jo4zrb83k5mfwg9
https://github.com/apache/tomcat/commit/1385c624b4a1e994426e810075c850edc38a700e (9.0.57)
https://github.com/apache/tomcat/commit/97943959ba721ad5e8e8ba765a68d2b153348530 (8.5.74)
Issue introduced by the fix for CVE-2020-9484
[jessie] - tomcat7 <ignored> (Minor issue; local race condition)

Search for package or bug name: Reporting problems