tomcat8, tomcat9
2017-06-16 19:22
CVE-2017-5650 tomcat8
2017-04-20 05:03
2017-04-14 10:21
2017-04-14 00:03


In Apache Tomcat 9.0.0.M1 to 9.0.0.M18 and 8.5.0 to 8.5.12, the handling of an HTTP/2 GOAWAY frame for a connection did not close streams associated with that connection that were currently waiting for a WINDOW_UPDATE before allowing the application to write more data. These waiting streams each consumed a thread. A malicious client could therefore construct a series of HTTP/2 requests that would consume all available processing threads.

Am I vulnerable?

The constraints below list the versions that this vulnerability is patched in, and versions that are unaffected. If a patch is ready but unrealeased, then it is pending.

Or, you can just let us figure it out for you! Appcanary continously monitor your installed packages, and tell you if any of them are vulnerable.

Sign up for monitoring

Affected package information

Release Package Patched in
upstream tomcat8 8.5.11-2


Release Package Reason
precise tomcat9 DNE
tomcat8 DNE
trusty tomcat9 DNE
tomcat8 DNE
vivid/stable-phone-overlay tomcat9 DNE
tomcat8 DNE
vivid/ubuntu-core tomcat9 DNE
tomcat8 DNE
xenial tomcat9 DNE
tomcat8 not-affected
yakkety tomcat9 DNE
tomcat8 not-affected
zesty tomcat9 DNE
tomcat8 not-affected
devel tomcat9 DNE
tomcat8 not-affected

Needs Triage

Release Package Reason
upstream tomcat9 needs-triage