Security update for tomcat
Announcement ID: | SUSE-SU-2016:3079-1 |
---|---|
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves seven vulnerabilities and has four security fixes can now be installed.
Description:
This update for Tomcat provides the following fixes:
Feature changes:
The embedded Apache Commons DBCP component was updated to version 2.0. (bsc#1010893 fate#321029)
Security fixes: - CVE-2016-0762: Realm Timing Attack (bsc#1007854) - CVE-2016-5018: Security Manager Bypass (bsc#1007855) - CVE-2016-6794: System Property Disclosure (bsc#1007857) - CVE-2016-6796: Manager Bypass (bsc#1007858) - CVE-2016-6797: Unrestricted Access to Global Resources (bsc#1007853) - CVE-2016-8735: Remote code execution vulnerability in JmxRemoteLifecycleListener (bsc#1011805) - CVE-2016-6816: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests (bsc#1011812)
Bugs fixed: - Fixed StringIndexOutOfBoundsException in WebAppClassLoaderBase.filter(). (bsc#974407) - Fixed a deployment error in the examples webapp by changing the context.xml format to the new one introduced by Tomcat 8. (bsc#1004728) - Enabled optional setenv.sh script. See section '(3.4) Using the "setenv" script' in http://tomcat.apache.org/tomcat-8.0-doc/RUNNING.txt. (bsc#1002639) - Fixed regression caused by CVE-2016-6816.
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Server for SAP Applications 12 SP1
zypper in -t patch SUSE-SLE-SERVER-12-SP1-2016-1791=1
-
SUSE Linux Enterprise Server 12 SP1
zypper in -t patch SUSE-SLE-SERVER-12-SP1-2016-1791=1
Package List:
-
SUSE Linux Enterprise Server for SAP Applications 12 SP1 (noarch)
- tomcat-javadoc-8.0.32-10.13.2
- tomcat-el-3_0-api-8.0.32-10.13.2
- tomcat-lib-8.0.32-10.13.2
- tomcat-webapps-8.0.32-10.13.2
- tomcat-jsp-2_3-api-8.0.32-10.13.2
- tomcat-docs-webapp-8.0.32-10.13.2
- tomcat-servlet-3_1-api-8.0.32-10.13.2
- tomcat-admin-webapps-8.0.32-10.13.2
- tomcat-8.0.32-10.13.2
-
SUSE Linux Enterprise Server 12 SP1 (noarch)
- tomcat-javadoc-8.0.32-10.13.2
- tomcat-el-3_0-api-8.0.32-10.13.2
- tomcat-lib-8.0.32-10.13.2
- tomcat-webapps-8.0.32-10.13.2
- tomcat-jsp-2_3-api-8.0.32-10.13.2
- tomcat-docs-webapp-8.0.32-10.13.2
- tomcat-servlet-3_1-api-8.0.32-10.13.2
- tomcat-admin-webapps-8.0.32-10.13.2
- tomcat-8.0.32-10.13.2
References:
- https://www.suse.com/security/cve/CVE-2016-0762.html
- https://www.suse.com/security/cve/CVE-2016-5018.html
- https://www.suse.com/security/cve/CVE-2016-6794.html
- https://www.suse.com/security/cve/CVE-2016-6796.html
- https://www.suse.com/security/cve/CVE-2016-6797.html
- https://www.suse.com/security/cve/CVE-2016-6816.html
- https://www.suse.com/security/cve/CVE-2016-8735.html
- https://bugzilla.suse.com/show_bug.cgi?id=1002639
- https://bugzilla.suse.com/show_bug.cgi?id=1004728
- https://bugzilla.suse.com/show_bug.cgi?id=1007853
- https://bugzilla.suse.com/show_bug.cgi?id=1007854
- https://bugzilla.suse.com/show_bug.cgi?id=1007855
- https://bugzilla.suse.com/show_bug.cgi?id=1007857
- https://bugzilla.suse.com/show_bug.cgi?id=1007858
- https://bugzilla.suse.com/show_bug.cgi?id=1010893
- https://bugzilla.suse.com/show_bug.cgi?id=1011805
- https://bugzilla.suse.com/show_bug.cgi?id=1011812
- https://bugzilla.suse.com/show_bug.cgi?id=974407