Name | CVE-2019-0199 |
Description | The HTTP/2 implementation in Apache Tomcat 9.0.0.M1 to 9.0.14 and 8.5.0 to 8.5.37 accepted streams with excessive numbers of SETTINGS frames and also permitted clients to keep streams open without reading/writing request/response data. By keeping streams open for requests that utilised the Servlet API's blocking I/O, clients were able to cause server-side threads to block eventually leading to thread exhaustion and a DoS. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DSA-4596-1 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
tomcat9 (PTS) | bullseye (security), bullseye | 9.0.43-2~deb11u10 | fixed |
| bookworm | 9.0.70-2 | fixed |
| sid, trixie | 9.0.95-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
tomcat8 | source | jessie | (not affected) | | | |
tomcat8 | source | stretch | 8.5.50-0+deb9u1 | | DSA-4596-1 | |
tomcat8 | source | (unstable) | 8.5.38-1 | | | |
tomcat9 | source | (unstable) | 9.0.16-1 | | | |
Notes
[jessie] - tomcat8 <not-affected> (HTTP/2 support not implemented)
https://bugzilla.redhat.com/show_bug.cgi?id=1693325
When fixing this issue make sure to fix it completely to not open CVE-2019-10072.