View | Details | Raw Unified | Return to bug 247555
Collapse All | Expand All

(-)vuln.xml (+38 lines)
Line 60 Link Here
61
  <vuln vid="4c24249a-b777-11ea-b78f-b42e99a1b9c3">
62
    <topic>Apache Tomcat -- HTTP/2 DoS</topic>
63
    <affects>
64
      <package>
65
	<name>tomcat85</name>
66
	<range><lt>8.5.55</lt></range>
67
      </package>
68
      <package>
69
	<name>tomcat9</name>
70
	<range><lt>9.0.36</lt></range>
71
      </package>
72
      <package>
73
	<name>tomcat-devel</name>
74
	<range><lt>10.0.0-M6</lt></range>
75
      </package>
76
    </affects>
77
    <description>
78
      <body xmlns="http://www.w3.org/1999/xhtml">
79
	<p>The Apache Software Foundation reports:</p>
80
	<blockquote>
81
    <p>CVE-2020-11996: A specially crafted sequence of HTTP/2 requests could trigger high CPU
82
usage for several seconds. If a sufficient number of such requests were
83
made on concurrent HTTP/2 connections, the server could become unresponsive.</p>
84
	</blockquote>
85
      </body>
86
    </description>
87
    <references>
88
    <url>http://tomcat.apache.org/security-8.html</url>
89
    <url>http://tomcat.apache.org/security-9.html</url>
90
    <url>http://tomcat.apache.org/security-10.html</url>
91
      <cvename>CVE-2020-11996</cvename>
92
   </references>
93
    <dates>
94
      <discovery>2020-06-07</discovery>
95
      <entry>2020-06-26</entry>
96
    </dates>
97
  </vuln>
98

Return to bug 247555