tomcat-coyote is vulnerable to authorization bypass. The vulnerability exists as requests could contain HTTP headers of a previous request rather than the intended headers, if a HTTP/2 client has exceeded the agreed maximum number of concurrent streams for a connection.
lists.opensuse.org/opensuse-security-announce/2020-11/msg00002.html
lists.opensuse.org/opensuse-security-announce/2020-11/msg00021.html
tomcat.apache.org/security-10.html
tomcat.apache.org/security-8.html
tomcat.apache.org/security-9.html
github.com/apache/tomcat/commit/1bbc650cbc3f08d85a1ec6d803c47ae53a84f3bb
github.com/apache/tomcat/commit/55911430df13f8c9998fbdee1f9716994d2db59b
github.com/apache/tomcat/commit/9d7def063b47407a09a2f9202beed99f4dcb292a
lists.apache.org/thread.html/r4a390027eb27e4550142fac6c8317cc684b157ae314d31514747f307%40%3Cannounce.tomcat.apache.org%3E
lists.debian.org/debian-lts-announce/2020/10/msg00019.html
security.netapp.com/advisory/ntap-20201016-0007/
www.debian.org/security/2021/dsa-4835
www.openwall.com/lists/oss-security/2020/10/12/1
www.oracle.com/security-alerts/cpuApr2021.html