-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Low: tomcat security update
Advisory ID:       RHSA-2021:0882-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://access.redhat.com/errata/RHSA-2021:0882
Issue date:        2021-03-16
CVE Names:         CVE-2019-17563 CVE-2020-1935 
====================================================================
1. Summary:

An update for tomcat is now available for Red Hat Enterprise Linux 7.6
Extended Update Support.

Red Hat Product Security has rated this update as having a security impact
of Low. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux ComputeNode EUS (v. 7.6) - noarch
Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6) - noarch
Red Hat Enterprise Linux Server EUS (v. 7.6) - noarch
Red Hat Enterprise Linux Server Optional EUS (v. 7.6) - noarch
Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7) - noarch
Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7) - noarch

3. Description:

Apache Tomcat is a servlet container for the Java Servlet and JavaServer
Pages (JSP) technologies.

Security Fix(es):

* tomcat: Session fixation when using FORM authentication (CVE-2019-17563)

* tomcat: Mishandling of Transfer-Encoding header allows for HTTP request
smuggling (CVE-2020-1935)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1785711 - CVE-2019-17563 tomcat: Session fixation when using FORM authentication
1806835 - CVE-2020-1935 tomcat: Mishandling of Transfer-Encoding header allows for HTTP request smuggling

6. Package List:

Red Hat Enterprise Linux ComputeNode EUS (v. 7.6):

Source:
tomcat-7.0.76-11.el7_6.src.rpm

noarch:
tomcat-servlet-3.0-api-7.0.76-11.el7_6.noarch.rpm

Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6):

noarch:
tomcat-7.0.76-11.el7_6.noarch.rpm
tomcat-admin-webapps-7.0.76-11.el7_6.noarch.rpm
tomcat-docs-webapp-7.0.76-11.el7_6.noarch.rpm
tomcat-el-2.2-api-7.0.76-11.el7_6.noarch.rpm
tomcat-javadoc-7.0.76-11.el7_6.noarch.rpm
tomcat-jsp-2.2-api-7.0.76-11.el7_6.noarch.rpm
tomcat-jsvc-7.0.76-11.el7_6.noarch.rpm
tomcat-lib-7.0.76-11.el7_6.noarch.rpm
tomcat-webapps-7.0.76-11.el7_6.noarch.rpm

Red Hat Enterprise Linux Server EUS (v. 7.6):

Source:
tomcat-7.0.76-11.el7_6.src.rpm

noarch:
tomcat-7.0.76-11.el7_6.noarch.rpm
tomcat-admin-webapps-7.0.76-11.el7_6.noarch.rpm
tomcat-el-2.2-api-7.0.76-11.el7_6.noarch.rpm
tomcat-jsp-2.2-api-7.0.76-11.el7_6.noarch.rpm
tomcat-lib-7.0.76-11.el7_6.noarch.rpm
tomcat-servlet-3.0-api-7.0.76-11.el7_6.noarch.rpm
tomcat-webapps-7.0.76-11.el7_6.noarch.rpm

Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7):

Source:
tomcat-7.0.76-11.el7_6.src.rpm

noarch:
tomcat-7.0.76-11.el7_6.noarch.rpm
tomcat-admin-webapps-7.0.76-11.el7_6.noarch.rpm
tomcat-el-2.2-api-7.0.76-11.el7_6.noarch.rpm
tomcat-jsp-2.2-api-7.0.76-11.el7_6.noarch.rpm
tomcat-lib-7.0.76-11.el7_6.noarch.rpm
tomcat-servlet-3.0-api-7.0.76-11.el7_6.noarch.rpm
tomcat-webapps-7.0.76-11.el7_6.noarch.rpm

Red Hat Enterprise Linux Server Optional EUS (v. 7.6):

noarch:
tomcat-7.0.76-11.el7_6.noarch.rpm
tomcat-admin-webapps-7.0.76-11.el7_6.noarch.rpm
tomcat-docs-webapp-7.0.76-11.el7_6.noarch.rpm
tomcat-el-2.2-api-7.0.76-11.el7_6.noarch.rpm
tomcat-javadoc-7.0.76-11.el7_6.noarch.rpm
tomcat-jsp-2.2-api-7.0.76-11.el7_6.noarch.rpm
tomcat-jsvc-7.0.76-11.el7_6.noarch.rpm
tomcat-lib-7.0.76-11.el7_6.noarch.rpm
tomcat-webapps-7.0.76-11.el7_6.noarch.rpm

Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7):

noarch:
tomcat-7.0.76-11.el7_6.noarch.rpm
tomcat-admin-webapps-7.0.76-11.el7_6.noarch.rpm
tomcat-docs-webapp-7.0.76-11.el7_6.noarch.rpm
tomcat-el-2.2-api-7.0.76-11.el7_6.noarch.rpm
tomcat-javadoc-7.0.76-11.el7_6.noarch.rpm
tomcat-jsp-2.2-api-7.0.76-11.el7_6.noarch.rpm
tomcat-jsvc-7.0.76-11.el7_6.noarch.rpm
tomcat-lib-7.0.76-11.el7_6.noarch.rpm
tomcat-webapps-7.0.76-11.el7_6.noarch.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2019-17563
https://access.redhat.com/security/cve/CVE-2020-1935
https://access.redhat.com/security/updates/classification/#low

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIVAwUBYFDH09zjgjWX9erEAQg8pg//SMhxioERYKZXW5+iCoDE538C3oAOvMj+
3kNaLltg6RwHKXiQiCbh2NpPxK6uweiI9l8LO5jqbaYMGHUYfm+/hvI+wzNwqyvD
4QS6yU8sJopRsOWV6Y9cQJHnZI0MeZ4LcYVhtP2kcnD0Hx5DSjmVvHBCaboRXWR1
EXhjl5xRt76ZQY0p/NR2koTaGbQQ12P2p23zIiwD+qCjc+JeGnKi6cwoD+YK/qb6
1FM3Xuazyn+yMsCoiZ6tW4AQiXPltRtleuuSEXLNDurvdbJ+qNJDFJacapIOxdWR
iC0gzwdPywgrrLvmftv5PtsBRf4F7EV+OsYKxlxnVfCNSqKdjJ7sKtd2UaBsc3UX
f6P4rzxaielIyX1eMA8k5Ih80PzkgfKHcKs4OntbdGMuzg0vKA7ZJzj1zt5Tj9LV
M42PS+2IJBHL8JmtNFgsv1xka7GdKdcTO3eT09U94zRDGW/oUNmA/pp4w+2siFZ6
sDQTUvZzBXS/R9MDJZe2XC5e6dxBPSkDTomi2Ow2vlzp8G84iQN6qRBcVe0KRE7m
VCs4xagaqO0pjDRgEYfs9RpHz5/UppENeJAds8UIANJJIwnYP2GI1KD5aySs1Pfn
4ziXib9ZBv24D8wZMjTo10VpxWbiXlFkkLXn6IYRa0gbvPLJCon636UIlSYAQSm/
D4mV0vKLWLc=eTD2
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2021-0882:01 Low: tomcat security update

An update for tomcat is now available for Red Hat Enterprise Linux 7.6 Extended Update Support

Summary

Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies.
Security Fix(es):
* tomcat: Session fixation when using FORM authentication (CVE-2019-17563)
* tomcat: Mishandling of Transfer-Encoding header allows for HTTP request smuggling (CVE-2020-1935)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.



Summary


Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258

References

https://access.redhat.com/security/cve/CVE-2019-17563 https://access.redhat.com/security/cve/CVE-2020-1935 https://access.redhat.com/security/updates/classification/#low

Package List

Red Hat Enterprise Linux ComputeNode EUS (v. 7.6):
Source: tomcat-7.0.76-11.el7_6.src.rpm
noarch: tomcat-servlet-3.0-api-7.0.76-11.el7_6.noarch.rpm
Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6):
noarch: tomcat-7.0.76-11.el7_6.noarch.rpm tomcat-admin-webapps-7.0.76-11.el7_6.noarch.rpm tomcat-docs-webapp-7.0.76-11.el7_6.noarch.rpm tomcat-el-2.2-api-7.0.76-11.el7_6.noarch.rpm tomcat-javadoc-7.0.76-11.el7_6.noarch.rpm tomcat-jsp-2.2-api-7.0.76-11.el7_6.noarch.rpm tomcat-jsvc-7.0.76-11.el7_6.noarch.rpm tomcat-lib-7.0.76-11.el7_6.noarch.rpm tomcat-webapps-7.0.76-11.el7_6.noarch.rpm
Red Hat Enterprise Linux Server EUS (v. 7.6):
Source: tomcat-7.0.76-11.el7_6.src.rpm
noarch: tomcat-7.0.76-11.el7_6.noarch.rpm tomcat-admin-webapps-7.0.76-11.el7_6.noarch.rpm tomcat-el-2.2-api-7.0.76-11.el7_6.noarch.rpm tomcat-jsp-2.2-api-7.0.76-11.el7_6.noarch.rpm tomcat-lib-7.0.76-11.el7_6.noarch.rpm tomcat-servlet-3.0-api-7.0.76-11.el7_6.noarch.rpm tomcat-webapps-7.0.76-11.el7_6.noarch.rpm
Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7):
Source: tomcat-7.0.76-11.el7_6.src.rpm
noarch: tomcat-7.0.76-11.el7_6.noarch.rpm tomcat-admin-webapps-7.0.76-11.el7_6.noarch.rpm tomcat-el-2.2-api-7.0.76-11.el7_6.noarch.rpm tomcat-jsp-2.2-api-7.0.76-11.el7_6.noarch.rpm tomcat-lib-7.0.76-11.el7_6.noarch.rpm tomcat-servlet-3.0-api-7.0.76-11.el7_6.noarch.rpm tomcat-webapps-7.0.76-11.el7_6.noarch.rpm
Red Hat Enterprise Linux Server Optional EUS (v. 7.6):
noarch: tomcat-7.0.76-11.el7_6.noarch.rpm tomcat-admin-webapps-7.0.76-11.el7_6.noarch.rpm tomcat-docs-webapp-7.0.76-11.el7_6.noarch.rpm tomcat-el-2.2-api-7.0.76-11.el7_6.noarch.rpm tomcat-javadoc-7.0.76-11.el7_6.noarch.rpm tomcat-jsp-2.2-api-7.0.76-11.el7_6.noarch.rpm tomcat-jsvc-7.0.76-11.el7_6.noarch.rpm tomcat-lib-7.0.76-11.el7_6.noarch.rpm tomcat-webapps-7.0.76-11.el7_6.noarch.rpm
Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7):
noarch: tomcat-7.0.76-11.el7_6.noarch.rpm tomcat-admin-webapps-7.0.76-11.el7_6.noarch.rpm tomcat-docs-webapp-7.0.76-11.el7_6.noarch.rpm tomcat-el-2.2-api-7.0.76-11.el7_6.noarch.rpm tomcat-javadoc-7.0.76-11.el7_6.noarch.rpm tomcat-jsp-2.2-api-7.0.76-11.el7_6.noarch.rpm tomcat-jsvc-7.0.76-11.el7_6.noarch.rpm tomcat-lib-7.0.76-11.el7_6.noarch.rpm tomcat-webapps-7.0.76-11.el7_6.noarch.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/


Severity
Advisory ID: RHSA-2021:0882-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2021:0882
Issued Date: : 2021-03-16
CVE Names: CVE-2019-17563 CVE-2020-1935

Topic

An update for tomcat is now available for Red Hat Enterprise Linux 7.6Extended Update Support.Red Hat Product Security has rated this update as having a security impactof Low. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures

Red Hat Enterprise Linux ComputeNode EUS (v. 7.6) - noarch

Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6) - noarch

Red Hat Enterprise Linux Server EUS (v. 7.6) - noarch

Red Hat Enterprise Linux Server Optional EUS (v. 7.6) - noarch

Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7) - noarch

Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7) - noarch


Bugs Fixed

1785711 - CVE-2019-17563 tomcat: Session fixation when using FORM authentication

1806835 - CVE-2020-1935 tomcat: Mishandling of Transfer-Encoding header allows for HTTP request smuggling


Related News