{"id":"MGASA-2020-0331","summary":"Updated tomcat packages fix security vulnerability","details":"A specially crafted sequence of HTTP/2 requests could trigger high CPU usage\nfor several seconds. If a sufficient number of such requests were made on\nconcurrent HTTP/2 connections, the server could become unresponsive\n(CVE-2020-11996).\n\nAn h2c direct connection did not release the HTTP/1.1 processor after the\nupgrade to HTTP/2. If a sufficient number of such requests were made, an\nOutOfMemoryException could occur leading to a denial of service\n(CVE-2020-13934).\n\nThe payload length in a WebSocket frame was not correctly validated. Invalid\npayload lengths could trigger an infinite loop. Multiple requests with invalid\npayload lengths could lead to a denial of service (CVE-2020-13935).\n","modified":"2026-04-16T00:09:28.743840387Z","published":"2020-08-18T18:47:25Z","upstream":["CVE-2020-11996","CVE-2020-13934","CVE-2020-13935"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2020-0331.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=26862"},{"type":"WEB","url":"http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.36"},{"type":"WEB","url":"http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.37"}],"affected":[{"package":{"name":"tomcat","ecosystem":"Mageia:7","purl":"pkg:rpm/mageia/tomcat?arch=source&distro=mageia-7"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"9.0.37-1.2.mga7"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2020-0331.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}