First published: Wed Jun 10 2020(Updated: )
Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache Tomcat Servlet container, JBoss HTTP Connector (mod_cluster), the PicketLink Vault extension for Apache Tomcat, and the Tomcat Native library.<br>This release of Red Hat JBoss Web Server 5.3.1 serves as a replacement for Red Hat JBoss Web Server 5.3.0, and includes bug fixes, enhancements, and component upgrades, which are documented in the Release Notes, linked to in the References.<br>Security Fix(es):<br><li> tomcat: Apache Tomcat Remote Code Execution via session persistence (CVE-2020-9484)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat JBoss Web Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2020:2509 is classified as important.
To fix RHSA-2020:2509, you need to apply the relevant security patches provided by Red Hat.
RHSA-2020:2509 affects the Red Hat JBoss Web Server and its components including the Apache Tomcat Servlet container.
RHSA-2020:2509 may not be applicable to all versions; it is important to check the specific version affected.
More information about RHSA-2020:2509 can be found in the Red Hat Security Advisory.