USN-4596-1

See a problem?
Source
https://ubuntu.com/security/notices/USN-4596-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4596-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-4596-1
Related
Published
2020-10-21T13:55:35.590369Z
Modified
2020-10-21T13:55:35.590369Z
Summary
tomcat9 vulnerabilities
Details

It was discovered that Tomcat did not properly manage HTTP/2 streams. An attacker could possibly use this to cause Tomcat to consume resources, resulting in a denial of service. (CVE-2020-11996)

It was discovered that Tomcat did not properly release the HTTP/1.1 processor after the upgrade to HTTP/2. An attacker could possibly use this to generate an OutOfMemoryException, resulting in a denial of service. (CVE-2020-13934)

It was discovered that Tomcat did not properly validate the payload length in a WebSocket frame. An attacker could possibly use this to trigger an infinite loop, resulting in a denial of service. (CVE-2020-13935)

It was discovered that Tomcat did not properly deserialize untrusted data. An attacker could possibly use this issue to execute arbitrary code. (CVE-2020-9484)

References

Affected packages

Ubuntu:20.04:LTS / tomcat9

Package

Name
tomcat9
Purl
pkg:deb/ubuntu/tomcat9@9.0.31-1ubuntu0.1?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
9.0.31-1ubuntu0.1

Affected versions

9.*

9.0.24-1
9.0.27-1
9.0.31-1

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "tomcat9": "9.0.31-1ubuntu0.1",
            "tomcat9-user": "9.0.31-1ubuntu0.1",
            "libtomcat9-embed-java": "9.0.31-1ubuntu0.1",
            "tomcat9-docs": "9.0.31-1ubuntu0.1",
            "libtomcat9-java": "9.0.31-1ubuntu0.1",
            "tomcat9-examples": "9.0.31-1ubuntu0.1",
            "tomcat9-common": "9.0.31-1ubuntu0.1",
            "tomcat9-admin": "9.0.31-1ubuntu0.1"
        }
    ]
}