Apache Tomcat - Denial of Service
High severity
GitHub Reviewed
Published
Jul 3, 2024
to the GitHub Advisory Database
•
Updated Aug 4, 2024
Package
Affected versions
>= 11.0.0-M1, < 11.0.0-M21
>= 10.1.0-M1, < 10.1.25
>= 9.0.0-M1, < 9.0.90
Patched versions
11.0.0-M21
10.1.25
9.0.90
>= 11.0.0-M1, < 11.0.0-M21
>= 10.1.0-M1, < 10.1.25
>= 9.0.0-M1, < 9.0.90
11.0.0-M21
10.1.25
9.0.90
Description
Published by the National Vulnerability Database
Jul 3, 2024
Published to the GitHub Advisory Database
Jul 3, 2024
Reviewed
Jul 5, 2024
Last updated
Aug 4, 2024
Improper Handling of Exceptional Conditions, Uncontrolled Resource Consumption vulnerability in Apache Tomcat. When processing an HTTP/2 stream, Tomcat did not handle some cases of excessive HTTP headers correctly. This led to a miscounting of active HTTP/2 streams which in turn led to the use of an incorrect infinite timeout which allowed connections to remain open which should have been closed.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M20, from 10.1.0-M1 through 10.1.24, from 9.0.0-M1 through 9.0.89.
Users are recommended to upgrade to version 11.0.0-M21, 10.1.25 or 9.0.90, which fixes the issue.
References