Security update for tomcat
Announcement ID: | SUSE-SU-2016:3081-1 |
---|---|
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves seven vulnerabilities and has two security fixes can now be installed.
Description:
This update for tomcat fixes the following issues:
Feature changes:
The embedded Apache Commons DBCP component was updated to version 2.0. (bsc#1010893 fate#321029)
Security fixes: - CVE-2016-0762: Realm Timing Attack (bsc#1007854) - CVE-2016-5018: Security Manager Bypass (bsc#1007855) - CVE-2016-6794: System Property Disclosure (bsc#1007857) - CVE-2016-6796: Security Manager Bypass (bsc#1007858) - CVE-2016-6797: Unrestricted Access to Global Resources (bsc#1007853) - CVE-2016-8735: Remote code execution vulnerability in JmxRemoteLifecycleListener (bsc#1011805) - CVE-2016-6816: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests (bsc#1011812)
Bug fixes: - Enabled optional setenv.sh script. See section '(3.4) Using the "setenv" script' in http://tomcat.apache.org/tomcat-8.0-doc/RUNNING.txt. (bsc#1002639)
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Server for the Raspberry Pi 12-SP2
zypper in -t patch SUSE-SLE-RPI-12-SP2-2016-1790=1
-
SUSE Linux Enterprise High Performance Computing 12 SP2
zypper in -t patch SUSE-SLE-SERVER-12-SP2-2016-1790=1
-
SUSE Linux Enterprise Server 12 SP2
zypper in -t patch SUSE-SLE-SERVER-12-SP2-2016-1790=1
-
SUSE Linux Enterprise Server for SAP Applications 12 SP2
zypper in -t patch SUSE-SLE-SERVER-12-SP2-2016-1790=1
Package List:
-
SUSE Linux Enterprise Server for the Raspberry Pi 12-SP2 (noarch)
- tomcat-jsp-2_3-api-8.0.36-17.1
- tomcat-webapps-8.0.36-17.1
- tomcat-javadoc-8.0.36-17.1
- tomcat-8.0.36-17.1
- tomcat-el-3_0-api-8.0.36-17.1
- tomcat-admin-webapps-8.0.36-17.1
- tomcat-lib-8.0.36-17.1
- tomcat-docs-webapp-8.0.36-17.1
- tomcat-servlet-3_1-api-8.0.36-17.1
-
SUSE Linux Enterprise High Performance Computing 12 SP2 (noarch)
- tomcat-jsp-2_3-api-8.0.36-17.1
- tomcat-webapps-8.0.36-17.1
- tomcat-javadoc-8.0.36-17.1
- tomcat-8.0.36-17.1
- tomcat-el-3_0-api-8.0.36-17.1
- tomcat-admin-webapps-8.0.36-17.1
- tomcat-lib-8.0.36-17.1
- tomcat-docs-webapp-8.0.36-17.1
- tomcat-servlet-3_1-api-8.0.36-17.1
-
SUSE Linux Enterprise Server 12 SP2 (noarch)
- tomcat-jsp-2_3-api-8.0.36-17.1
- tomcat-webapps-8.0.36-17.1
- tomcat-javadoc-8.0.36-17.1
- tomcat-8.0.36-17.1
- tomcat-el-3_0-api-8.0.36-17.1
- tomcat-admin-webapps-8.0.36-17.1
- tomcat-lib-8.0.36-17.1
- tomcat-docs-webapp-8.0.36-17.1
- tomcat-servlet-3_1-api-8.0.36-17.1
-
SUSE Linux Enterprise Server for SAP Applications 12 SP2 (noarch)
- tomcat-jsp-2_3-api-8.0.36-17.1
- tomcat-webapps-8.0.36-17.1
- tomcat-javadoc-8.0.36-17.1
- tomcat-8.0.36-17.1
- tomcat-el-3_0-api-8.0.36-17.1
- tomcat-admin-webapps-8.0.36-17.1
- tomcat-lib-8.0.36-17.1
- tomcat-docs-webapp-8.0.36-17.1
- tomcat-servlet-3_1-api-8.0.36-17.1
References:
- https://www.suse.com/security/cve/CVE-2016-0762.html
- https://www.suse.com/security/cve/CVE-2016-5018.html
- https://www.suse.com/security/cve/CVE-2016-6794.html
- https://www.suse.com/security/cve/CVE-2016-6796.html
- https://www.suse.com/security/cve/CVE-2016-6797.html
- https://www.suse.com/security/cve/CVE-2016-6816.html
- https://www.suse.com/security/cve/CVE-2016-8735.html
- https://bugzilla.suse.com/show_bug.cgi?id=1002639
- https://bugzilla.suse.com/show_bug.cgi?id=1007853
- https://bugzilla.suse.com/show_bug.cgi?id=1007854
- https://bugzilla.suse.com/show_bug.cgi?id=1007855
- https://bugzilla.suse.com/show_bug.cgi?id=1007857
- https://bugzilla.suse.com/show_bug.cgi?id=1007858
- https://bugzilla.suse.com/show_bug.cgi?id=1010893
- https://bugzilla.suse.com/show_bug.cgi?id=1011805
- https://bugzilla.suse.com/show_bug.cgi?id=1011812