Lucene search

K
mageiaGentoo FoundationMGASA-2020-0397
HistoryOct 30, 2020 - 1:25 a.m.

Updated tomcat packages fix a security vulnerability

2020-10-3001:25:06
Gentoo Foundation
advisories.mageia.org
10

0.001 Low

EPSS

Percentile

41.6%

If an HTTP/2 client exceeded the agreed maximum number of concurrent streams for a connection (in violation of the HTTP/2 protocol), it was possible that a subsequent request made on that connection could contain HTTP headers - including HTTP/2 pseudo headers - from a previous request rather than the intended headers. This could lead to users seeing responses for unexpected resources (CVE-2020-13943).

OSVersionArchitecturePackageVersionFilename
Mageia7noarchtomcat< 9.0.38-1tomcat-9.0.38-1.mga7