Security update for tomcat

SUSE Security Update: Security update for tomcat
Announcement ID: SUSE-SU-2017:1660-1
Rating: important
References: #1007853 #1007854 #1007855 #1007857 #1007858 #1011805 #1011812 #1015119 #1033447 #1033448 #986359 #988489
Affected Products:
  • SUSE Linux Enterprise Server for SAP 12
  • SUSE Linux Enterprise Server 12-LTSS

  • An update that fixes 12 vulnerabilities is now available.

    Description:


    Tomcat was updated to version 7.0.78, fixing various bugs and security
    issues.

    For full details see
    https://tomcat.apache.org/tomcat-7.0-doc/changelog.html

    Security issues fixed:

    - CVE-2016-0762: A realm timing attack in tomcat was fixed which could
    disclose existence of users (bsc#1007854)
    - CVE-2016-3092: Usage of vulnerable FileUpload package could have
    resulted in denial of service (bsc#986359)
    - CVE-2016-5018: A security manager bypass via a Tomcat utility method
    that was accessible to web applications was fixed. (bsc#1007855)
    - CVE-2016-5388: Setting HTTP_PROXY environment variable via Proxy header
    (bsc#988489)
    - CVE-2016-6794: A tomcat system property disclosure was fixed.
    (bsc#1007857)
    - CVE-2016-6796: A tomcat security manager bypass via manipulation of the
    configuration parameters for the JSP Servlet. (bsc#1007858)
    - CVE-2016-6797: A tomcat unrestricted access to global resources via
    ResourceLinkFactory was fixed. (bsc#1007853)
    - CVE-2016-6816: A HTTP Request smuggling vulnerability due to permitting
    invalid character in HTTP requests was fixed. (bsc#1011812)
    - CVE-2016-8735: A Remote code execution vulnerability in
    JmxRemoteLifecycleListener was fixed (bsc#1011805)
    - CVE-2016-8745: A Tomcat Information Disclosure in the error handling of
    send file code for the NIO HTTP connector was fixed. (bsc#1015119)
    - CVE-2017-5647: A tomcat information disclosure in pipelined request
    processing was fixed. (bsc#1033448)
    - CVE-2017-5648: A tomcat information disclosure due to using incorrect
    facade objects was fixed (bsc#1033447)

    Patch Instructions:

    To install this SUSE Security Update use YaST online_update.
    Alternatively you can run the command listed for your product:

    • SUSE Linux Enterprise Server for SAP 12:
      zypper in -t patch SUSE-SLE-SAP-12-2017-1027=1
    • SUSE Linux Enterprise Server 12-LTSS:
      zypper in -t patch SUSE-SLE-SERVER-12-2017-1027=1

    To bring your system up-to-date, use "zypper patch".

    Package List:

    • SUSE Linux Enterprise Server for SAP 12 (noarch):
      • tomcat-7.0.78-7.13.4
      • tomcat-admin-webapps-7.0.78-7.13.4
      • tomcat-docs-webapp-7.0.78-7.13.4
      • tomcat-el-2_2-api-7.0.78-7.13.4
      • tomcat-javadoc-7.0.78-7.13.4
      • tomcat-jsp-2_2-api-7.0.78-7.13.4
      • tomcat-lib-7.0.78-7.13.4
      • tomcat-servlet-3_0-api-7.0.78-7.13.4
      • tomcat-webapps-7.0.78-7.13.4
    • SUSE Linux Enterprise Server 12-LTSS (noarch):
      • tomcat-7.0.78-7.13.4
      • tomcat-admin-webapps-7.0.78-7.13.4
      • tomcat-docs-webapp-7.0.78-7.13.4
      • tomcat-el-2_2-api-7.0.78-7.13.4
      • tomcat-javadoc-7.0.78-7.13.4
      • tomcat-jsp-2_2-api-7.0.78-7.13.4
      • tomcat-lib-7.0.78-7.13.4
      • tomcat-servlet-3_0-api-7.0.78-7.13.4
      • tomcat-webapps-7.0.78-7.13.4

    References: