{"id":"CVE-2024-34750","details":"Improper Handling of Exceptional Conditions, Uncontrolled Resource Consumption vulnerability in Apache Tomcat. When processing an HTTP/2 stream, Tomcat did not handle some cases of excessive HTTP headers correctly. This led to a miscounting of active HTTP/2 streams which in turn led to the use of an incorrect infinite timeout which allowed connections to remain open which should have been closed.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M20, from 10.1.0-M1 through 10.1.24, from 9.0.0-M1 through 9.0.89.\n\nThe following versions were EOL at the time the CVE was created but are \nknown to be affected: 8.5.0 though 8.5.100. Other EOL versions may also be affected.\n\n\nUsers are recommended to upgrade to version 11.0.0-M21, 10.1.25 or 9.0.90, which fixes the issue.","aliases":["BIT-tomcat-2024-34750","GHSA-wm9w-rjj3-j356"],"modified":"2026-03-27T08:59:15.452769291Z","published":"2024-07-03T20:15:04.083Z","related":["ALSA-2024:5693","ALSA-2024:5694","CGA-2fpc-444g-9244","MGASA-2024-0267","SUSE-SU-2024:2413-1","SUSE-SU-2024:2485-1","SUSE-SU-2024:2539-1","SUSE-SU-2026:1058-1","openSUSE-SU-2024:14119-1","openSUSE-SU-2024:14120-1"],"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/07/msg00009.html"},{"type":"ADVISORY","url":"https://lists.apache.org/thread/4kqf0bc9gxymjc2x7v3p7dvplnl77y8l"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20240816-0004/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/apache/tomcat","events":[{"introduced":"16bf392c67833ad549733b58c350ff92b5ee782a"},{"fixed":"65977c7d1da9b6016e2b19de06c3be7373f40859"},{"introduced":"e9d17cddc285615807ec5fef09240777436b25dc"},{"fixed":"a0038178b617423537dc66b2f516c53da7093421"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-34750.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}