apache tomcat is vulnerable to denial of service. The HTTP/1.1 processor is not released after an upgrade to HTTP/2, allowing an attacker to cause a denial of service condition due to an OutOfMemoryException
by sending a large number of upgrade requests.
lists.opensuse.org/opensuse-security-announce/2020-07/msg00084.html
lists.opensuse.org/opensuse-security-announce/2020-07/msg00088.html
tomcat.apache.org/security-10.html
tomcat.apache.org/security-8.html
tomcat.apache.org/security-9.html
lists.apache.org/thread.html/r61f411cf82488d6ec213063fc15feeeb88e31b0ca9c29652ee4f962e%40%3Cannounce.tomcat.apache.org%3E
lists.apache.org/thread.html/ra072b1f786e7d139e86f1d1145572e0ff71cef38a96d9c6f5362aac8@%3Cdev.tomcat.apache.org%3E
lists.debian.org/debian-lts-announce/2020/07/msg00017.html
security.netapp.com/advisory/ntap-20200724-0003/
usn.ubuntu.com/4596-1/
www.debian.org/security/2020/dsa-4727
www.oracle.com//security-alerts/cpujul2021.html
www.oracle.com/security-alerts/cpuApr2021.html
www.oracle.com/security-alerts/cpujan2021.html
www.oracle.com/security-alerts/cpujan2022.html
www.oracle.com/security-alerts/cpuoct2020.html