The HTTP/2 header parser entered an infinite loop if a header was received that was larger than the available buffer. This made a denial of service attack possible. Affects: 8.5.0 to 8.5.6 Upstream patch: http://svn.apache.org/viewvc?view=rev&rev=1765798
This only affects 8.5+, which isn't shipped any any Red Hat distribution yet.
Created tomcat tracking bugs for this issue: Affects: fedora-all [bug 1397493]