| Name | CVE-2020-11996 |
| Description | A specially crafted sequence of HTTP/2 requests sent to Apache Tomcat 10.0.0-M1 to 10.0.0-M5, 9.0.0.M1 to 9.0.35 and 8.5.0 to 8.5.55 could trigger high CPU usage for several seconds. If a sufficient number of such requests were made on concurrent HTTP/2 connections, the server could become unresponsive. |
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
| References | DLA-2279-1, DSA-4727-1 |
The table below lists information on source packages.
| Source Package | Release | Version | Status |
|---|---|---|---|
| tomcat9 (PTS) | bullseye | 9.0.43-2~deb11u10 | fixed |
| bullseye (security) | 9.0.107-0+deb11u1 | fixed | |
| bookworm | 9.0.70-2 | fixed | |
| forky, trixie | 9.0.95-1 | fixed | |
| sid | 9.0.111-1 | fixed |
The information below is based on the following data on fixed versions.
| Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
|---|---|---|---|---|---|---|
| tomcat8 | source | stretch | 8.5.54-0+deb9u2 | DLA-2279-1 | ||
| tomcat8 | source | (unstable) | (unfixed) | |||
| tomcat9 | source | buster | 9.0.31-1~deb10u2 | DSA-4727-1 | ||
| tomcat9 | source | (unstable) | 9.0.36-1 |
https://www.openwall.com/lists/oss-security/2020/06/25/6
https://github.com/apache/tomcat/commit/9a0231683a77e2957cea0fdee88b193b30b0c976 (9.0.36)
https://github.com/apache/tomcat/commit/c8acd2ab7371e39aeca7c306f3b5380f00afe552 (8.5.56)