The HTTP/2 header parser entered an infinite loop if a header was received that was larger than the available buffer. This made a denial of service attack possible.
Affects: 8.5.0 to 8.5.6
This only affects 8.5+, which isn't shipped any any Red Hat distribution yet.
Created tomcat tracking bugs for this issue:
Affects: fedora-all [bug 1397493]