Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:alpm/archlinux/tomcat9@9.0.37-1
purl pkg:alpm/archlinux/tomcat9@9.0.37-1
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (3)
Vulnerability Summary Aliases
VCID-46bv-6b7y-3bca A specially crafted sequence of HTTP/2 requests sent to Apache Tomcat 10.0.0-M1 to 10.0.0-M5, 9.0.0.M1 to 9.0.35 and 8.5.0 to 8.5.55 could trigger high CPU usage for several seconds. If a sufficient number of such requests were made on concurrent HTTP/2 connections, the server could become unresponsive. CVE-2020-11996
GHSA-53hp-jpwq-2jgq
VCID-dzan-r49k-kqab An h2c direct connection to Apache Tomcat 10.0.0-M1 to 10.0.0-M6, 9.0.0.M5 to 9.0.36 and 8.5.1 to 8.5.56 did not release the HTTP/1.1 processor after the upgrade to HTTP/2. If a sufficient number of such requests were made, an OutOfMemoryException could occur leading to a denial of service. CVE-2020-13934
GHSA-vf77-8h7g-gghp
VCID-nvbx-q971-skgm The payload length in a WebSocket frame was not correctly validated in Apache Tomcat 10.0.0-M1 to 10.0.0-M6, 9.0.0.M1 to 9.0.36, 8.5.0 to 8.5.56 and 7.0.27 to 7.0.104. Invalid payload lengths could trigger an infinite loop. Multiple requests with invalid payload lengths could lead to a denial of service. CVE-2020-13935
GHSA-m7jv-hq7h-mq7c

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-01T18:26:59.888323+00:00 Arch Linux Importer Fixing VCID-46bv-6b7y-3bca https://security.archlinux.org/AVG-1196 38.0.0
2026-04-01T18:25:48.483430+00:00 Arch Linux Importer Fixing VCID-dzan-r49k-kqab https://security.archlinux.org/AVG-1205 38.0.0
2026-04-01T18:25:48.460887+00:00 Arch Linux Importer Fixing VCID-nvbx-q971-skgm https://security.archlinux.org/AVG-1205 38.0.0