Bug 1887648 (CVE-2020-13943)
Summary: | CVE-2020-13943 tomcat: Apache Tomcat HTTP/2 Request mix-up | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Ted Jongseok Won <jwon> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | aboyko, aileenc, akoufoud, alazarot, alee, almorale, anstephe, asoldano, atangrin, avibelli, bbaranow, bgeorges, bmaxwell, brian.stansberry, cdewolf, chazlett, cmoulliard, coolsvap, csutherl, darran.lofthouse, dbecker, dkreling, dosoudil, drieden, eleandro, etirelli, ggaughan, gmalinko, gzaronik, hhorak, huwang, ibek, ikanello, ivan.afonichev, iweiss, janstey, java-sig-commits, jawilson, jbalunas, jclere, jjoyce, jochrist, jolee, jorton, jpallich, jperkins, jschatte, jschluet, jstastny, jwon, krathod, krzysztof.daniel, kverlaen, kwills, lgao, lhh, lpeer, lthon, mbabacek, mburns, mizdebsk, mkolesni, mnovotny, msochure, msvehla, mszynkie, myarboro, nwallace, pgallagh, pjindal, pmackay, rguimara, rhcs-maint, rrajasek, rruss, rstancel, rsvoboda, rsynek, sclewis, scohen, sdaley, slinaber, smaestri, tom.jenkinson, vondruch, weli |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | tomcat 10.0.0-M8, tomcat 9.0.38, tomcat 8.5.58 | Doc Type: | --- |
Doc Text: |
A flaw was found in Apache Tomcat. If an HTTP/2 client exceeded the agreed maximum number of concurrent streams for a connection (in violation of the HTTP/2 protocol), it is possible that a subsequent request made on that connection could contain HTTP headers - including HTTP/2 pseudo headers - from a previous request rather than the intended headers. This could lead to users seeing responses for unexpected resources. The highest threat from this vulnerability is to data confidentiality.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2021-02-11 16:09:50 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1889329 | ||
Bug Blocks: | 1887641 |
Description
Ted Jongseok Won
2020-10-13 05:02:15 UTC
External References: http://mail-archives.apache.org/mod_mbox/tomcat-announce/202010.mbox/%3C2b767c6e-dcb9-5816-bd69-a3bc0771fef3%40apache.org%3E http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.0-M8 http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.38 http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.58 This vulnerability is out of security support scope for the following products: * Red Hat JBoss Enterprise Application Platform 6 * Red Hat JBoss Data Grid 6 * Red Hat JBoss Fuse 6 * Red Hat JBoss Data Virtualization 6 Please refer to https://access.redhat.com/support/policy/updates/jboss_notes for more details. This issue has been addressed in the following products: Red Hat JBoss Web Server 5.4 on RHEL 7 Red Hat JBoss Web Server 5.4 on RHEL 8 Via RHSA-2021:0494 https://access.redhat.com/errata/RHSA-2021:0494 This issue has been addressed in the following products: Red Hat JBoss Web Server Via RHSA-2021:0495 https://access.redhat.com/errata/RHSA-2021:0495 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-13943 This issue has been addressed in the following products: Red Hat Support for Spring Boot 2.4.9 Via RHSA-2021:4012 https://access.redhat.com/errata/RHSA-2021:4012 This issue has been addressed in the following products: Red Hat Fuse 7.10 Via RHSA-2021:5134 https://access.redhat.com/errata/RHSA-2021:5134 |