A flaw was found in Apache Tomcat. The HTTP header parsing code used an approach to end-of-line (EOL) parsing that allowed some invalid HTTP headers to be parsed as valid. This led to the possibility of HTTP Request Smuggling if Tomcat was located behind a reverse proxy that incorrectly handled the invalid Transfer-Encoding header in a particular manner. The highest threat with this vulnerability is system availability.
Workaround for Red Hat Satellite 6 is to add iptables rule to deny TCP requests of Tomcat that are not originating from the Satellite.
For other Red Hat products, either mitigation isn't available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
bugzilla.redhat.com/show_bug.cgi?id=1806835
nvd.nist.gov/vuln/detail/CVE-2020-1935
tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.100
tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.51
tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.31
www.cve.org/CVERecord?id=CVE-2020-1935