Security update for tomcat
Announcement ID: | SUSE-SU-2017:1660-1 |
Rating: | important |
References: | #1007853 #1007854 #1007855 #1007857 #1007858 #1011805 #1011812 #1015119 #1033447 #1033448 #986359 #988489 |
Affected Products: |
An update that fixes 12 vulnerabilities is now available.
Description:
Tomcat was updated to version 7.0.78, fixing various bugs and security
issues.
For full details see
https://tomcat.apache.org/tomcat-7.0-doc/changelog.html
Security issues fixed:
- CVE-2016-0762: A realm timing attack in tomcat was fixed which could
disclose existence of users (bsc#1007854)
- CVE-2016-3092: Usage of vulnerable FileUpload package could have
resulted in denial of service (bsc#986359)
- CVE-2016-5018: A security manager bypass via a Tomcat utility method
that was accessible to web applications was fixed. (bsc#1007855)
- CVE-2016-5388: Setting HTTP_PROXY environment variable via Proxy header
(bsc#988489)
- CVE-2016-6794: A tomcat system property disclosure was fixed.
(bsc#1007857)
- CVE-2016-6796: A tomcat security manager bypass via manipulation of the
configuration parameters for the JSP Servlet. (bsc#1007858)
- CVE-2016-6797: A tomcat unrestricted access to global resources via
ResourceLinkFactory was fixed. (bsc#1007853)
- CVE-2016-6816: A HTTP Request smuggling vulnerability due to permitting
invalid character in HTTP requests was fixed. (bsc#1011812)
- CVE-2016-8735: A Remote code execution vulnerability in
JmxRemoteLifecycleListener was fixed (bsc#1011805)
- CVE-2016-8745: A Tomcat Information Disclosure in the error handling of
send file code for the NIO HTTP connector was fixed. (bsc#1015119)
- CVE-2017-5647: A tomcat information disclosure in pipelined request
processing was fixed. (bsc#1033448)
- CVE-2017-5648: A tomcat information disclosure due to using incorrect
facade objects was fixed (bsc#1033447)
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server for SAP 12:
zypper in -t patch SUSE-SLE-SAP-12-2017-1027=1
- SUSE Linux Enterprise Server 12-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-2017-1027=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server for SAP 12 (noarch):
- tomcat-7.0.78-7.13.4
- tomcat-admin-webapps-7.0.78-7.13.4
- tomcat-docs-webapp-7.0.78-7.13.4
- tomcat-el-2_2-api-7.0.78-7.13.4
- tomcat-javadoc-7.0.78-7.13.4
- tomcat-jsp-2_2-api-7.0.78-7.13.4
- tomcat-lib-7.0.78-7.13.4
- tomcat-servlet-3_0-api-7.0.78-7.13.4
- tomcat-webapps-7.0.78-7.13.4
- SUSE Linux Enterprise Server 12-LTSS (noarch):
- tomcat-7.0.78-7.13.4
- tomcat-admin-webapps-7.0.78-7.13.4
- tomcat-docs-webapp-7.0.78-7.13.4
- tomcat-el-2_2-api-7.0.78-7.13.4
- tomcat-javadoc-7.0.78-7.13.4
- tomcat-jsp-2_2-api-7.0.78-7.13.4
- tomcat-lib-7.0.78-7.13.4
- tomcat-servlet-3_0-api-7.0.78-7.13.4
- tomcat-webapps-7.0.78-7.13.4
References:
- https://www.suse.com/security/cve/CVE-2016-0762.html
- https://www.suse.com/security/cve/CVE-2016-3092.html
- https://www.suse.com/security/cve/CVE-2016-5018.html
- https://www.suse.com/security/cve/CVE-2016-5388.html
- https://www.suse.com/security/cve/CVE-2016-6794.html
- https://www.suse.com/security/cve/CVE-2016-6796.html
- https://www.suse.com/security/cve/CVE-2016-6797.html
- https://www.suse.com/security/cve/CVE-2016-6816.html
- https://www.suse.com/security/cve/CVE-2016-8735.html
- https://www.suse.com/security/cve/CVE-2016-8745.html
- https://www.suse.com/security/cve/CVE-2017-5647.html
- https://www.suse.com/security/cve/CVE-2017-5648.html
- https://bugzilla.suse.com/1007853
- https://bugzilla.suse.com/1007854
- https://bugzilla.suse.com/1007855
- https://bugzilla.suse.com/1007857
- https://bugzilla.suse.com/1007858
- https://bugzilla.suse.com/1011805
- https://bugzilla.suse.com/1011812
- https://bugzilla.suse.com/1015119
- https://bugzilla.suse.com/1033447
- https://bugzilla.suse.com/1033448
- https://bugzilla.suse.com/986359
- https://bugzilla.suse.com/988489