Summary: | CVE-2020-17527 tomcat: HTTP/2 request header mix-up | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Guilherme de Almeida Suckevicz <gsuckevi> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | aileenc, akoufoud, alazarot, alee, almorale, anstephe, ascheel, asoldano, atangrin, avibelli, bbaranow, bgeorges, bmaxwell, brian.stansberry, cdewolf, chazlett, cmoulliard, coolsvap, csutherl, darran.lofthouse, dbecker, dkreling, dosoudil, drieden, eleandro, etirelli, ggaughan, gmalinko, gzaronik, huwang, ibek, ikanello, ivan.afonichev, iweiss, janstey, java-sig-commits, jawilson, jclere, jjoyce, jochrist, jolee, jpallich, jperkins, jschatte, jschluet, jstastny, jwon, krathod, krzysztof.daniel, kverlaen, kwills, lgao, lhh, lpeer, lthon, mbabacek, mburns, mkolesni, mnovotny, msochure, msvehla, mszynkie, myarboro, nwallace, pgallagh, pjindal, pmackay, rguimara, rhcs-maint, rhel8-maint, rrajasek, rruss, rstancel, rsvoboda, rsynek, sclewis, scohen, sdaley, slinaber, smaestri, tom.jenkinson, vhalbert, weli |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
See Also: |
https://issues.redhat.com/browse/JWS-1894 https://issues.redhat.com/browse/ENTSBT-883 https://issues.redhat.com/browse/ENTESB-15412 |
||
Whiteboard: | |||
Fixed In Version: | tomcat 10.0.0-M10, tomcat 9.0.40, tomcat 8.5.60 | Doc Type: | If docs needed, set a value |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2021-02-11 16:09:56 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Bug Depends On: | 1904222, 1906969, 1910708 | ||
Bug Blocks: | 1904223 |
Description
Guilherme de Almeida Suckevicz
2020-12-03 20:38:31 UTC
Created tomcat tracking bugs for this issue: Affects: fedora-all [bug 1904222] This vulnerability is out of security support scope for the following products: * Red Hat Enterprise Application Platform 6 * Red Hat Data Grid 6 * Red Hat JBoss Data Virtualization 6 * Red Hat JBoss Fuse 6 Please refer to https://access.redhat.com/support/policy/updates/jboss_notes for more details. External References: http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.60 http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.40 http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.0-M10 Statement: Red Hat Enterprise Linux 8's Identity Management and Certificate System are using a vulnerable version of Tomcat that is bundled into the pki-servlet-engine component. However, HTTP/2 is not enabled in such a configuration, and it is not possible to trigger the flaw in a supported setup. A future update may fix the code. Red Hat Enterprise Linux 7's tomcat package, Identity Management, and Certificate System are all not affected by this flaw because HTTP/2 is not supported in the shipped version of tomcat in those packages. tomcat5 and tomcat6 in Red Hat Enterprise Linux 5 and 6 (respectively) are not affected by this flaw because HTTP/2 is not supported in the shipped versions of those packages. This issue has been addressed in the following products: Red Hat JBoss Web Server 5.4 on RHEL 7 Red Hat JBoss Web Server 5.4 on RHEL 8 Via RHSA-2021:0494 https://access.redhat.com/errata/RHSA-2021:0494 This issue has been addressed in the following products: Red Hat JBoss Web Server Via RHSA-2021:0495 https://access.redhat.com/errata/RHSA-2021:0495 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-17527 This issue has been addressed in the following products: Red Hat Support for Spring Boot 2.4.9 Via RHSA-2021:4012 https://access.redhat.com/errata/RHSA-2021:4012 This issue has been addressed in the following products: Red Hat Fuse 7.10 Via RHSA-2021:5134 https://access.redhat.com/errata/RHSA-2021:5134 |