A specially crafted sequence of HTTP/2 requests sent to Apache Tomcat 10.0.0-M1 to 10.0.0-M5, 9.0.0.M1 to 9.0.35 and 8.5.0 to 8.5.55 could trigger high CPU usage for several seconds. If a sufficient number of such requests were made on concurrent HTTP/2 connections, the server could become unresponsive.
mail-archives.apache.org/mod_mbox/tomcat-announce/202006.mbox/%3Cfd56bc1d-1219-605b-99c7-946bf7bd8ad4%40apache.org%3E
tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.0-M6
tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.56
tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.36
bugzilla.redhat.com/show_bug.cgi?id=1851420
nvd.nist.gov/vuln/detail/CVE-2020-11996
www.cve.org/CVERecord?id=CVE-2020-11996