-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Low: Red Hat JBoss Web Server 3.1 Service Pack 11 security update Advisory ID: RHSA-2021:0491-01 Product: Red Hat JBoss Web Server Advisory URL: https://access.redhat.com/errata/RHSA-2021:0491 Issue date: 2021-02-11 CVE Names: CVE-2020-1971 ==================================================================== 1. Summary: An update is now available for Red Hat JBoss Web Server 3.1, for RHEL 7 and Windows. Red Hat Product Security has rated this release as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Description: Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache HTTP Server, the Apache Tomcat Servlet container, Apache Tomcat Connector (mod_jk), JBoss HTTP Connector (mod_cluster), Hibernate, and the Tomcat Native library. This release of Red Hat JBoss Web Server 3.1 Service Pack 11 serves as a replacement for Red Hat JBoss Web Server 3.1, and includes bug fixes, which are documented in the Release Notes document linked to in the References. Security Fix(es): * openssl: EDIPARTYNAME NULL pointer de-reference (CVE-2020-1971) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 3. Solution: Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on. The References section of this erratum contains a download link for the update. You must be logged in to download the update. 4. Bugs fixed (https://bugzilla.redhat.com/): 1903409 - CVE-2020-1971 openssl: EDIPARTYNAME NULL pointer de-reference 5. References: https://access.redhat.com/security/cve/CVE-2020-1971 https://access.redhat.com/security/updates/classification/#low 6. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYCUz/tzjgjWX9erEAQilCA//fsO0xWz8j3IU6h73LvoRGSPAqS33oqEG xlh7OipJa8jf5epkjMxgsAoDXIUDownkxBbEhG4B5fJIx9YR+VgPZEQghV6O3Su/ PA+zd7RWFXmu+g2NXG5G74ts2F6HrTgCvmmyjpZ9SJoghtS86rdz3hXHsSMHXHuC rErHYR1/B6jr0HB4rH4tZTNe+7rbtHibzW6vAYFJO/gGd5qCRioz8omtHvCDctFN XCFeRxmfMweUQMNXUCxDoUj2RJvUe5JtwOuEWuDGJirSPLzuD7XRRWZFwroK1MnZ iaxhEGxFYFvIvViuOBKREd0/Si7oXLZ1Dv6wxyFYwBSjBKjZu6rMU7Pfodij8e7x w1qcMwgH7QzS2GEGLsCm/5+Mixg5Hm4eYWc8bfsYYy0f7aqTLqHC9gqxBUENyes5 ij7QZavND9jnaoJPTHV+pWeKWFkZ5mZLJfr0SqiaDP7eteesWkXquPyGzUU+UI9c 2incjfXl428NsDqOubfvk+vjXKcf6HvgyPAF3GMvtbFtp4rbNm0AQ2yc7XiYFeWH 3BRWt5XoNM8WJktRLMOA//H11dZj8pPY8KfWNNUYjD9knZBZheZt3K8RIBGsh5mM P6s1FGucdksQYe/9rY95ZhPZg5W75Ra9Iq8HDEGFK0VGrDK+gf85Je+YV6qlAZE1 HLTXbXpU7AI=np8I -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce