Description
A specially crafted sequence of HTTP/2 requests sent to Apache Tomcat 10.0.0-M1 to 10.0.0-M5, 9.0.0.M1 to 9.0.35 and 8.5.0 to 8.5.55 could trigger high CPU usage for several seconds. If a sufficient number of such requests were made on concurrent HTTP/2 connections, the server could become unresponsive.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2279-1 | tomcat8 security update |
Github GHSA |
GHSA-53hp-jpwq-2jgq | Uncontrolled Resource Consumption in Apache Tomcat |
Ubuntu USN |
USN-4596-1 | Tomcat vulnerabilities |
References
History
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Subscriptions
Apache
Subscribe
Tomcat
Subscribe
Canonical
Subscribe
Ubuntu Linux
Subscribe
Debian
Subscribe
Debian Linux
Subscribe
Netapp
Subscribe
Oncommand System Manager
Subscribe
Opensuse
Subscribe
Leap
Subscribe
Oracle
Subscribe
Mysql Enterprise Monitor
Subscribe
Siebel Ui Framework
Subscribe
Workload Manager
Subscribe
Redhat
Subscribe
Jboss Enterprise Web Server
Subscribe
Jboss Fuse
Subscribe
Openshift Application Runtimes
Subscribe
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-04T11:48:57.318Z
Reserved: 2020-04-21T00:00:00.000Z
Link: CVE-2020-11996
No data.
Status : Modified
Published: 2020-06-26T17:15:10.153
Modified: 2024-11-21T04:59:04.687
Link: CVE-2020-11996
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Github GHSA
Ubuntu USN