It was discovered that Tomcat did not properly manage HTTP/2 streams. An attacker could possibly use this to cause Tomcat to consume resources, resulting in a denial of service. (CVE-2020-11996)
It was discovered that Tomcat did not properly release the HTTP/1.1 processor after the upgrade to HTTP/2. An attacker could possibly use this to generate an OutOfMemoryException, resulting in a denial of service. (CVE-2020-13934)
It was discovered that Tomcat did not properly validate the payload length in a WebSocket frame. An attacker could possibly use this to trigger an infinite loop, resulting in a denial of service. (CVE-2020-13935)
It was discovered that Tomcat did not properly deserialize untrusted data. An attacker could possibly use this issue to execute arbitrary code. (CVE-2020-9484)
{ "binaries": [ { "binary_name": "libtomcat9-embed-java", "binary_version": "9.0.31-1ubuntu0.1" }, { "binary_name": "libtomcat9-java", "binary_version": "9.0.31-1ubuntu0.1" }, { "binary_name": "tomcat9", "binary_version": "9.0.31-1ubuntu0.1" }, { "binary_name": "tomcat9-admin", "binary_version": "9.0.31-1ubuntu0.1" }, { "binary_name": "tomcat9-common", "binary_version": "9.0.31-1ubuntu0.1" }, { "binary_name": "tomcat9-docs", "binary_version": "9.0.31-1ubuntu0.1" }, { "binary_name": "tomcat9-examples", "binary_version": "9.0.31-1ubuntu0.1" }, { "binary_name": "tomcat9-user", "binary_version": "9.0.31-1ubuntu0.1" } ], "availability": "No subscription required" }