Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Red Hat JBoss Web Server 6.0.1
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Red Hat JBoss Web Server 6.0.1
ID: RHSA-2024:1325
Distribution: Red Hat
Plattformen: Red Hat JWS 6.0.1
Datum: Di, 19. März 2024, 07:28
Referenzen: https://bugzilla.redhat.com/show_bug.cgi?id=2235370
https://access.redhat.com/security/cve/CVE-2023-41080
https://access.redhat.com/security/cve/CVE-2024-24549
https://access.redhat.com/errata/RHSA-2024:1325
https://bugzilla.redhat.com/show_bug.cgi?id=2269607
https://access.redhat.com/security/cve/CVE-2023-5678
https://bugzilla.redhat.com/show_bug.cgi?id=2248616
https://access.redhat.com/security/cve/CVE-2023-46589
https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=webserver&downloadType=securityPatches&version=6.0
https://bugzilla.redhat.com/show_bug.cgi?id=2252050
Applikationen: Red Hat JBoss Web Server 6.0.1

Originalnachricht

Red Hat JBoss Web Server 6.0.1 zip release is now available for Red Hat
Enterprise Linux 8, Red Hat Enterprise Linux 9, and Windows Server.

Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Red Hat JBoss Web Server is a fully integrated and certified set of components
for hosting Java web applications. It is comprised of the Apache Tomcat Servlet container, JBoss HTTP Connector (mod_cluster), the PicketLink Vault extension for Apache Tomcat, and the Tomcat Native library.

This release of Red Hat JBoss Web Server 6.0.1 serves as a replacement for Red
Hat JBoss Web Server 6.0.0. This release includes bug fixes, enhancements and component upgrades, which are documented in the Release Notes linked to in the References section.

Security Fix(es):

* openssl: Generating excessively long X9.42 DH keys or checking excessively
long X9.42 DH keys or parameters may be very slow (CVE-2023-5678)

* tomcat: HTTP request smuggling via malformed trailer headers (CVE-2023-46589)

* tomcat: Open Redirect vulnerability in FORM authentication (CVE-2023-41080)

* tomcat: : Apache Tomcat: HTTP/2 header handling DoS (CVE-2024-24549)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

CVE-2023-5678: Missing Cryptographic Step (CWE-325)
CVE-2023-41080: URL Redirection to Untrusted Site ('Open Redirect')
(CWE-601)
CVE-2023-46589: Inconsistent Interpretation of HTTP Requests ('HTTP
Request/Response Smuggling') (CWE-444)
CVE-2024-24549: Improper Input Validation (CWE-20)
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung