-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Important: Red Hat JBoss Web Server 3.1 Service Pack 10 security update Advisory ID: RHSA-2020:3305-01 Product: Red Hat JBoss Web Server Advisory URL: https://access.redhat.com/errata/RHSA-2020:3305 Issue date: 2020-08-04 CVE Names: CVE-2020-1935 CVE-2020-13935 ==================================================================== 1. Summary: An update is now available for Red Hat JBoss Web Server 3.1, for RHEL 6, RHEL 7 and Windows. Red Hat Product Security has rated this release as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Description: Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache HTTP Server, the Apache Tomcat Servlet container, Apache Tomcat Connector (mod_jk), JBoss HTTP Connector (mod_cluster), Hibernate, and the Tomcat Native library. This release of Red Hat JBoss Web Server 3.1 Service Pack 10 serves as a replacement for Red Hat JBoss Web Server 3.1, and includes bug fixes, which are documented in the Release Notes document linked to in the References. Security Fix(es): * tomcat: multiple requests with invalid payload length in a WebSocket frame could lead to DoS (CVE-2020-13935) * tomcat: Mishandling of Transfer-Encoding header allows for HTTP request smuggling (CVE-2020-1935) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 3. Solution: Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on. The References section of this erratum contains a download link for the update. You must be logged in to download the update. 4. Bugs fixed (https://bugzilla.redhat.com/): 1806835 - CVE-2020-1935 tomcat: Mishandling of Transfer-Encoding header allows for HTTP request smuggling 1857024 - CVE-2020-13935 tomcat: multiple requests with invalid payload length in a WebSocket frame could lead to DoS 5. References: https://access.redhat.com/security/cve/CVE-2020-1935 https://access.redhat.com/security/cve/CVE-2020-13935 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=webserver&downloadType=securityPatches&version=3.1 https://access.redhat.com/documentation/en-us/red_hat_jboss_web_server/3.1/ 6. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2020 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBXylD+tzjgjWX9erEAQguExAAmiLW9+Fi7a5LqIjF8AmZRbT09mQwJVdR LgOBIuDaRu4PjekSyyHUmQx1PfbapVf9k8nU3gDovIyUTiF5EZuVg9ehKjRQMOqN dd7/N0XMALqCRISvVgviAencNXkrbW+/W4tLY4IgFCDCkHvwqxfZ51hh30pkwpjb a7qAIOXXvmpzy5iS/ohtpifRZowxih2VA8fhubuDxJGS1qkKXREjQjw/JubBBMfS 5K0y1HgMP6q2eAVPeEveGnRhLSigsk35VDeuXY4mnUK6DKiJpmV7PKLmEeT+ocU5 kE97DO7aficX4xAzTn9fXlwlObjq+VkQIgeOqJ01zLIp9pok6UbWPacugVEvLaVp D/iV54ExEphF+OW0dQZd3JvsxUdFHMyDp9bCkwwhuAtNhPfDqDAXjBpjof45AXqm OobvCWgemWJ4YHXk5RG6vWqR+hmKHOSbaV0MtxZvnZSBqxlRj0D1MemuJPWPQ7MA O+2k8sw/deQLl/UvYNlFmQBKhuk20v79oPPOs/BiT+gPAPMbD+bUx71llcqXoC0d Zz40X7rqwaEHk2f87yiU0bF+0A1+NBOan83TwsPWK2BtGruWhikiU1IQuqvanu7V +nmKgjTNeXVoYApl9yLSgA8Jqcu+5+qmmJU4t1SZ6M42cEcfkGJ4L0VYLWITtXFL XWCFZYGyMeM=yiu8 -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce