First published: Tue Apr 21 2020(Updated: )
Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache Tomcat Servlet container, JBoss HTTP Connector (mod_cluster), the PicketLink Vault extension for Apache Tomcat, and the Tomcat Native library.<br>This release of Red Hat JBoss Web Server 5.3 serves as a replacement for Red Hat JBoss Web Server 5.2, and includes bug fixes, enhancements, and component upgrades, which are documented in the Release Notes, linked to in the References.<br>Security Fix(es):<br><li> tomcat: Apache Tomcat AJP File Read/Inclusion Vulnerability (CVE-2020-1938)</li> <li> tomcat: local privilege escalation (CVE-2019-12418)</li> <li> tomcat: session fixation (CVE-2019-17563)</li> <li> tomcat: Regression in handling of Transfer-Encoding header allows for HTTP request smuggling (CVE-2019-17569)</li> <li> tomcat: Mishandling of Transfer-Encoding header allows for HTTP request smuggling (CVE-2020-1935)</li> For more details about the security issue(s), including the impact, a CVSS<br>score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jws5-tomcat | <9.0.30-3.redhat_4.1.el8 | 9.0.30-3.redhat_4.1.el8 |
redhat/jws5-tomcat-native | <1.2.23-4.redhat_4.el8 | 1.2.23-4.redhat_4.el8 |
redhat/jws5-tomcat-admin-webapps | <9.0.30-3.redhat_4.1.el8 | 9.0.30-3.redhat_4.1.el8 |
redhat/jws5-tomcat-docs-webapp | <9.0.30-3.redhat_4.1.el8 | 9.0.30-3.redhat_4.1.el8 |
redhat/jws5-tomcat-el | <3.0-api-9.0.30-3.redhat_4.1.el8 | 3.0-api-9.0.30-3.redhat_4.1.el8 |
redhat/jws5-tomcat-javadoc | <9.0.30-3.redhat_4.1.el8 | 9.0.30-3.redhat_4.1.el8 |
redhat/jws5-tomcat-jsp | <2.3-api-9.0.30-3.redhat_4.1.el8 | 2.3-api-9.0.30-3.redhat_4.1.el8 |
redhat/jws5-tomcat-lib | <9.0.30-3.redhat_4.1.el8 | 9.0.30-3.redhat_4.1.el8 |
redhat/jws5-tomcat-native-debuginfo | <1.2.23-4.redhat_4.el8 | 1.2.23-4.redhat_4.el8 |
redhat/jws5-tomcat-selinux | <9.0.30-3.redhat_4.1.el8 | 9.0.30-3.redhat_4.1.el8 |
redhat/jws5-tomcat-servlet | <4.0-api-9.0.30-3.redhat_4.1.el8 | 4.0-api-9.0.30-3.redhat_4.1.el8 |
redhat/jws5-tomcat-webapps | <9.0.30-3.redhat_4.1.el8 | 9.0.30-3.redhat_4.1.el8 |
redhat/jws5-tomcat | <9.0.30-3.redhat_4.1.el7 | 9.0.30-3.redhat_4.1.el7 |
redhat/jws5-tomcat-native | <1.2.23-4.redhat_4.el7 | 1.2.23-4.redhat_4.el7 |
redhat/jws5-tomcat-admin-webapps | <9.0.30-3.redhat_4.1.el7 | 9.0.30-3.redhat_4.1.el7 |
redhat/jws5-tomcat-docs-webapp | <9.0.30-3.redhat_4.1.el7 | 9.0.30-3.redhat_4.1.el7 |
redhat/jws5-tomcat-el | <3.0-api-9.0.30-3.redhat_4.1.el7 | 3.0-api-9.0.30-3.redhat_4.1.el7 |
redhat/jws5-tomcat-javadoc | <9.0.30-3.redhat_4.1.el7 | 9.0.30-3.redhat_4.1.el7 |
redhat/jws5-tomcat-jsp | <2.3-api-9.0.30-3.redhat_4.1.el7 | 2.3-api-9.0.30-3.redhat_4.1.el7 |
redhat/jws5-tomcat-lib | <9.0.30-3.redhat_4.1.el7 | 9.0.30-3.redhat_4.1.el7 |
redhat/jws5-tomcat-native-debuginfo | <1.2.23-4.redhat_4.el7 | 1.2.23-4.redhat_4.el7 |
redhat/jws5-tomcat-selinux | <9.0.30-3.redhat_4.1.el7 | 9.0.30-3.redhat_4.1.el7 |
redhat/jws5-tomcat-servlet | <4.0-api-9.0.30-3.redhat_4.1.el7 | 4.0-api-9.0.30-3.redhat_4.1.el7 |
redhat/jws5-tomcat-webapps | <9.0.30-3.redhat_4.1.el7 | 9.0.30-3.redhat_4.1.el7 |
redhat/jws5-tomcat | <9.0.30-3.redhat_4.1.el6 | 9.0.30-3.redhat_4.1.el6 |
redhat/jws5-tomcat-native | <1.2.23-4.redhat_4.el6 | 1.2.23-4.redhat_4.el6 |
redhat/jws5-tomcat-admin-webapps | <9.0.30-3.redhat_4.1.el6 | 9.0.30-3.redhat_4.1.el6 |
redhat/jws5-tomcat-docs-webapp | <9.0.30-3.redhat_4.1.el6 | 9.0.30-3.redhat_4.1.el6 |
redhat/jws5-tomcat-el | <3.0-api-9.0.30-3.redhat_4.1.el6 | 3.0-api-9.0.30-3.redhat_4.1.el6 |
redhat/jws5-tomcat-javadoc | <9.0.30-3.redhat_4.1.el6 | 9.0.30-3.redhat_4.1.el6 |
redhat/jws5-tomcat-jsp | <2.3-api-9.0.30-3.redhat_4.1.el6 | 2.3-api-9.0.30-3.redhat_4.1.el6 |
redhat/jws5-tomcat-lib | <9.0.30-3.redhat_4.1.el6 | 9.0.30-3.redhat_4.1.el6 |
redhat/jws5-tomcat-native-debuginfo | <1.2.23-4.redhat_4.el6 | 1.2.23-4.redhat_4.el6 |
redhat/jws5-tomcat-selinux | <9.0.30-3.redhat_4.1.el6 | 9.0.30-3.redhat_4.1.el6 |
redhat/jws5-tomcat-servlet | <4.0-api-9.0.30-3.redhat_4.1.el6 | 4.0-api-9.0.30-3.redhat_4.1.el6 |
redhat/jws5-tomcat-webapps | <9.0.30-3.redhat_4.1.el6 | 9.0.30-3.redhat_4.1.el6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2020:1520 is categorized as important.
To fix RHSA-2020:1520, update the affected packages to the specified remedied versions listed in the advisory.
The affected packages in RHSA-2020:1520 include various components of the jws5-tomcat such as jws5-tomcat, jws5-tomcat-native, and others across multiple Red Hat Enterprise Linux versions.
The recommended solution for RHSA-2020:1520 is to apply the updates, as alternative solutions may leave the system vulnerable.
RHSA-2020:1520 was issued on July 29, 2020.