Security update for tomcat6

SUSE Security Update: Security update for tomcat6
Announcement ID: SUSE-SU-2013:0226-1
Rating: moderate
References: #789406 #791423 #791424 #791426 #791679 #793391 #793394 #794548
Affected Products:
  • SUSE Manager 1.2 for SLE 11 SP1
  • SUSE Linux Enterprise Server 11 SP2 for VMware
  • SUSE Linux Enterprise Server 11 SP2

  • An update that fixes 8 vulnerabilities is now available.

    Description:


    This update of tomcat6 fixes the following security issues:

    * CVE-2012-4534: denial of service
    * CVE-2012-2733: tomcat: HTTP NIO connector OOM DoS via
    a request with large headers
    * CVE-2012-5885: tomcat: cnonce tracking weakness
    * CVE-2012-5886: tomcat: authentication caching weakness
    * CVE-2012-5887: tomcat: stale nonce weakness
    * CVE-2012-5568: tomcat: affected by slowloris DoS
    * CVE-2012-3546: tomcat: Bypass of security constraints
    * CVE-2012-4431: tomcat: bypass of CSRF prevention
    filter

    Security Issue references:

    * CVE-2012-5885
    >
    * CVE-2012-4431
    >
    * CVE-2012-3546
    >
    * CVE-2012-5887
    >
    * CVE-2012-4534
    >
    * CVE-2012-2733
    >
    * CVE-2012-5886
    >
    * CVE-2012-5568
    >

    Patch Instructions:

    To install this SUSE Security Update use YaST online_update.
    Alternatively you can run the command listed for your product:

    • SUSE Manager 1.2 for SLE 11 SP1:
      zypper in -t patch sleman12sp1-tomcat6-7209
    • SUSE Linux Enterprise Server 11 SP2 for VMware:
      zypper in -t patch slessp2-tomcat6-7208
    • SUSE Linux Enterprise Server 11 SP2:
      zypper in -t patch slessp2-tomcat6-7208

    To bring your system up-to-date, use "zypper patch".

    Package List:

    • SUSE Manager 1.2 for SLE 11 SP1 (noarch):
    • tomcat6-6.0.18-20.35.40.1
    • tomcat6-jsp-2_1-api-6.0.18-20.35.40.1
    • tomcat6-lib-6.0.18-20.35.40.1
    • tomcat6-servlet-2_5-api-6.0.18-20.35.40.1
    • SUSE Linux Enterprise Server 11 SP2 for VMware (noarch):
    • tomcat6-6.0.18-20.35.40.1
    • tomcat6-admin-webapps-6.0.18-20.35.40.1
    • tomcat6-docs-webapp-6.0.18-20.35.40.1
    • tomcat6-javadoc-6.0.18-20.35.40.1
    • tomcat6-jsp-2_1-api-6.0.18-20.35.40.1
    • tomcat6-lib-6.0.18-20.35.40.1
    • tomcat6-servlet-2_5-api-6.0.18-20.35.40.1
    • tomcat6-webapps-6.0.18-20.35.40.1
    • SUSE Linux Enterprise Server 11 SP2 (noarch):
    • tomcat6-6.0.18-20.35.40.1
    • tomcat6-admin-webapps-6.0.18-20.35.40.1
    • tomcat6-docs-webapp-6.0.18-20.35.40.1
    • tomcat6-javadoc-6.0.18-20.35.40.1
    • tomcat6-jsp-2_1-api-6.0.18-20.35.40.1
    • tomcat6-lib-6.0.18-20.35.40.1
    • tomcat6-servlet-2_5-api-6.0.18-20.35.40.1
    • tomcat6-webapps-6.0.18-20.35.40.1

    References:

    • http://support.novell.com/security/cve/CVE-2012-2733.html
    • http://support.novell.com/security/cve/CVE-2012-3546.html
    • http://support.novell.com/security/cve/CVE-2012-4431.html
    • http://support.novell.com/security/cve/CVE-2012-4534.html
    • http://support.novell.com/security/cve/CVE-2012-5568.html
    • http://support.novell.com/security/cve/CVE-2012-5885.html
    • http://support.novell.com/security/cve/CVE-2012-5886.html
    • http://support.novell.com/security/cve/CVE-2012-5887.html
    • https://bugzilla.novell.com/789406
    • https://bugzilla.novell.com/791423
    • https://bugzilla.novell.com/791424
    • https://bugzilla.novell.com/791426
    • https://bugzilla.novell.com/791679
    • https://bugzilla.novell.com/793391
    • https://bugzilla.novell.com/793394
    • https://bugzilla.novell.com/794548
    • http://download.suse.com/patch/finder/?keywords=10aa6410688bd05f48407e1b055f53e6
    • http://download.suse.com/patch/finder/?keywords=8caabee36d66ff05a162522ac84c989a