安全公告/【CVE-2020-13943】
基本信息
漏洞描述
If an HTTP/2 client connecting to Apache Tomcat 10.0.0-M1 to 10.0.0-M7, 9.0.0.M1 to 9.0.37 or 8.5.0 to 8.5.57 exceeded the agreed maximum number of concurrent streams for a connection (in violation of the HTTP/2 protocol), it was possible that a subsequent request made on that connection could contain HTTP headers - including HTTP/2 pseudo headers - from a previous request rather than the intended headers. This could lead to users seeing responses for unexpected resources.
修复方式
sudo apt update && sudo apt dist-upgrade
漏洞判定
执行命令apt policy PackageName获取软件包版本号,版本小于修复版本,则受此漏洞影响,版本大于等于修复版本,则此漏洞已修复
参考
https://security-tracker.debian.org/tracker/CVE-2020-13943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13943
https://nvd.nist.gov/vuln/detail/CVE-2020-13943