|Category:||Debian Local Security Checks|
|Title:||Debian LTS: Security Advisory for tomcat8 (DLA-2286-1)|
|Summary:||The remote host is missing an update for the 'tomcat8'; package(s) announced via the DLA-2286-1 advisory.|
The remote host is missing an update for the 'tomcat8'
package(s) announced via the DLA-2286-1 advisory.
Several security vulnerabilities have been discovered in the Tomcat
servlet and JSP engine.
An h2c direct connection to Apache Tomcat did not release the
HTTP/1.1 processor after the upgrade to HTTP/2. If a sufficient
number of such requests were made, an OutOfMemoryException could
occur leading to a denial of service.
The payload length in a WebSocket frame was not correctly validated
in Apache Tomcat. Invalid payload lengths could trigger an infinite
loop. Multiple requests with invalid payload lengths could lead to a
denial of service.
'tomcat8' package(s) on Debian Linux.
For Debian 9 stretch, these problems have been fixed in version
We recommend that you upgrade your tomcat8 packages.
Common Vulnerability Exposure (CVE) ID: CVE-2020-13934|
Common Vulnerability Exposure (CVE) ID: CVE-2020-13935
|Copyright||Copyright (C) 2020 Greenbone Networks GmbH|
|This is only one of 85075 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.