Red Hat Security Advisory 2020-3305-01 - Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache HTTP Server, the Apache Tomcat Servlet container, Apache Tomcat Connector, JBoss HTTP Connector, Hibernate, and the Tomcat Native library. This release of Red Hat JBoss Web Server 3.1 Service Pack 10 serves as a replacement for Red Hat JBoss Web Server 3.1, and includes bug fixes, which are documented in the Release Notes document linked to in the References. Issues addressed include HTTP request smuggling and denial of service vulnerabilities.
c243b17e41ad7e85f479e20ba6faa1fef7e0ab201e56fd7ca1a104d4ca29c03c
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Important: Red Hat JBoss Web Server 3.1 Service Pack 10 security update
Advisory ID: RHSA-2020:3305-01
Product: Red Hat JBoss Web Server
Advisory URL: https://access.redhat.com/errata/RHSA-2020:3305
Issue date: 2020-08-04
CVE Names: CVE-2020-1935 CVE-2020-13935
====================================================================
1. Summary:
An update is now available for Red Hat JBoss Web Server 3.1, for RHEL 6,
RHEL 7 and Windows.
Red Hat Product Security has rated this release as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
2. Description:
Red Hat JBoss Web Server is a fully integrated and certified set of
components for hosting Java web applications. It is comprised of the Apache
HTTP Server, the Apache Tomcat Servlet container, Apache Tomcat Connector
(mod_jk), JBoss HTTP Connector (mod_cluster), Hibernate, and the Tomcat
Native library.
This release of Red Hat JBoss Web Server 3.1 Service Pack 10 serves as a
replacement for Red Hat JBoss Web Server 3.1, and includes bug fixes, which
are documented in the Release Notes document linked to in the References.
Security Fix(es):
* tomcat: multiple requests with invalid payload length in a WebSocket
frame could lead to DoS (CVE-2020-13935)
* tomcat: Mishandling of Transfer-Encoding header allows for HTTP request
smuggling (CVE-2020-1935)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
3. Solution:
Before applying the update, back up your existing installation, including
all applications, configuration files, databases and database settings, and
so on.
The References section of this erratum contains a download link for the
update. You must be logged in to download the update.
4. Bugs fixed (https://bugzilla.redhat.com/):
1806835 - CVE-2020-1935 tomcat: Mishandling of Transfer-Encoding header allows for HTTP request smuggling
1857024 - CVE-2020-13935 tomcat: multiple requests with invalid payload length in a WebSocket frame could lead to DoS
5. References:
https://access.redhat.com/security/cve/CVE-2020-1935
https://access.redhat.com/security/cve/CVE-2020-13935
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=webserver&downloadType=securityPatches&version=3.1
https://access.redhat.com/documentation/en-us/red_hat_jboss_web_server/3.1/
6. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2020 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iQIVAwUBXylD+tzjgjWX9erEAQguExAAmiLW9+Fi7a5LqIjF8AmZRbT09mQwJVdR
LgOBIuDaRu4PjekSyyHUmQx1PfbapVf9k8nU3gDovIyUTiF5EZuVg9ehKjRQMOqN
dd7/N0XMALqCRISvVgviAencNXkrbW+/W4tLY4IgFCDCkHvwqxfZ51hh30pkwpjb
a7qAIOXXvmpzy5iS/ohtpifRZowxih2VA8fhubuDxJGS1qkKXREjQjw/JubBBMfS
5K0y1HgMP6q2eAVPeEveGnRhLSigsk35VDeuXY4mnUK6DKiJpmV7PKLmEeT+ocU5
kE97DO7aficX4xAzTn9fXlwlObjq+VkQIgeOqJ01zLIp9pok6UbWPacugVEvLaVp
D/iV54ExEphF+OW0dQZd3JvsxUdFHMyDp9bCkwwhuAtNhPfDqDAXjBpjof45AXqm
OobvCWgemWJ4YHXk5RG6vWqR+hmKHOSbaV0MtxZvnZSBqxlRj0D1MemuJPWPQ7MA
O+2k8sw/deQLl/UvYNlFmQBKhuk20v79oPPOs/BiT+gPAPMbD+bUx71llcqXoC0d
Zz40X7rqwaEHk2f87yiU0bF+0A1+NBOan83TwsPWK2BtGruWhikiU1IQuqvanu7V
+nmKgjTNeXVoYApl9yLSgA8Jqcu+5+qmmJU4t1SZ6M42cEcfkGJ4L0VYLWITtXFL
XWCFZYGyMeM=yiu8
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce