Security update for tomcat

Announcement ID: SUSE-SU-2018:3968-1
Rating: moderate
CVSS scores:
  • CVE-2018-11784 ( SUSE ): 6.1 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
  • CVE-2018-11784 ( NVD ): 4.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
Affected Products:
  • SUSE Linux Enterprise High Performance Computing 15
  • SUSE Linux Enterprise Server 15
  • SUSE Linux Enterprise Server for SAP Applications 15
  • Web and Scripting Module 15

An update that solves one vulnerability can now be installed.


This update for tomcat to 9.0.12 fixes the following issues:

See the full changelog at:

Security issues fixed:

  • CVE-2018-11784: When the default servlet in Apache Tomcat returned a redirect to a directory (e.g. redirecting to '/foo/' when the user requested '/foo') a specially crafted URL could be used to cause the redirect to be generated to any URI of the attackers choice. (bsc#1110850)

Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  • Web and Scripting Module 15
    zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-2018-2823=1

Package List:

  • Web and Scripting Module 15 (noarch)
    • tomcat-admin-webapps-9.0.12-3.8.3
    • tomcat-lib-9.0.12-3.8.3
    • tomcat-9.0.12-3.8.3
    • tomcat-jsp-2_3-api-9.0.12-3.8.3
    • tomcat-el-3_0-api-9.0.12-3.8.3
    • tomcat-servlet-4_0-api-9.0.12-3.8.3
    • tomcat-webapps-9.0.12-3.8.3