Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-52316 (GCVE-0-2024-52316)
Vulnerability from cvelistv5
- CWE-391 - Unchecked Error Condition
► | URL | Tags | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache Tomcat |
Version: 11.0.0-M1 ≤ 11.0.0-M26 Version: 10.1.0-M1 ≤ 10.1.30 Version: 9.0.0-M1 ≤ 9.0.95 Version: 8.5.0 ≤ 8.5.100 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:apache:tomcat:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "tomcat", "vendor": "apache", "versions": [ { "lessThanOrEqual": "9.0.95", "status": "affected", "version": "9.0.0-M1", "versionType": "semver" }, { "lessThanOrEqual": "10.1.30", "status": "affected", "version": "10.1.0-M1", "versionType": "semver" }, { "lessThanOrEqual": "11.0.0-M26", "status": "affected", "version": "11.0.0-M1", "versionType": "semver" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-52316", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-18T14:50:59.890424Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-13T13:30:10.255Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2025-01-24T20:03:09.111Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/11/18/2" }, { "url": "https://security.netapp.com/advisory/ntap-20250124-0003/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Apache Tomcat", "vendor": "Apache Software Foundation", "versions": [ { "lessThanOrEqual": "11.0.0-M26", "status": "affected", "version": "11.0.0-M1", "versionType": "semver" }, { "lessThanOrEqual": "10.1.30", "status": "affected", "version": "10.1.0-M1", "versionType": "semver" }, { "lessThanOrEqual": "9.0.95", "status": "affected", "version": "9.0.0-M1", "versionType": "semver" }, { "lessThanOrEqual": "8.5.100", "status": "affected", "version": "8.5.0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eUnchecked Error Condition vulnerability in Apache Tomcat. If Tomcat is configured to use a custom Jakarta Authentication (formerly JASPIC)\u0026nbsp;ServerAuthContext component which may throw an exception during the authentication process without explicitly setting an HTTP status to indicate failure, the authentication may not fail, allowing the user to bypass the authentication process. There are no known Jakarta\u0026nbsp;Authentication components that behave in this way.\u003c/p\u003e\u003cp\u003eThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M26, from 10.1.0-M1 through 10.1.30, from 9.0.0-M1 through 9.0.95.\u003c/p\u003e\u003cp\u003eThe following versions were EOL at the time the CVE was created but are \nknown to be affected: 8.5.0 though 8.5.100.\u003cbr\u003e\u003c/p\u003e\u003cp\u003eUsers are recommended to upgrade to version 11.0.0, 10.1.31 or 9.0.96, which fix the issue.\u003c/p\u003e" } ], "value": "Unchecked Error Condition vulnerability in Apache Tomcat. If Tomcat is configured to use a custom Jakarta Authentication (formerly JASPIC)\u00a0ServerAuthContext component which may throw an exception during the authentication process without explicitly setting an HTTP status to indicate failure, the authentication may not fail, allowing the user to bypass the authentication process. There are no known Jakarta\u00a0Authentication components that behave in this way.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M26, from 10.1.0-M1 through 10.1.30, from 9.0.0-M1 through 9.0.95.\n\nThe following versions were EOL at the time the CVE was created but are \nknown to be affected: 8.5.0 though 8.5.100.\n\n\nUsers are recommended to upgrade to version 11.0.0, 10.1.31 or 9.0.96, which fix the issue." } ], "metrics": [ { "other": { "content": { "text": "low" }, "type": "Textual description of severity" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-391", "description": "CWE-391 Unchecked Error Condition", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-08T11:20:48.868Z", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://lists.apache.org/thread/lopzlqh91jj9n334g02om08sbysdb928" } ], "source": { "discovery": "INTERNAL" }, "title": "Apache Tomcat: Authentication bypass when using Jakarta Authentication API", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2024-52316", "datePublished": "2024-11-18T11:32:22.072Z", "dateReserved": "2024-11-07T07:41:56.639Z", "dateUpdated": "2025-08-13T13:30:10.255Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-52316\",\"sourceIdentifier\":\"security@apache.org\",\"published\":\"2024-11-18T12:15:18.600\",\"lastModified\":\"2025-08-08T12:15:26.917\",\"vulnStatus\":\"Undergoing Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Unchecked Error Condition vulnerability in Apache Tomcat. If Tomcat is configured to use a custom Jakarta Authentication (formerly JASPIC)\u00a0ServerAuthContext component which may throw an exception during the authentication process without explicitly setting an HTTP status to indicate failure, the authentication may not fail, allowing the user to bypass the authentication process. There are no known Jakarta\u00a0Authentication components that behave in this way.\\n\\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M26, from 10.1.0-M1 through 10.1.30, from 9.0.0-M1 through 9.0.95.\\n\\nThe following versions were EOL at the time the CVE was created but are \\nknown to be affected: 8.5.0 though 8.5.100.\\n\\n\\nUsers are recommended to upgrade to version 11.0.0, 10.1.31 or 9.0.96, which fix the issue.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de condici\u00f3n de error no comprobada en Apache Tomcat. Si Tomcat est\u00e1 configurado para utilizar un componente ServerAuthContext de autenticaci\u00f3n de Jakarta (anteriormente JASPIC) personalizado que puede generar una excepci\u00f3n durante el proceso de autenticaci\u00f3n sin establecer expl\u00edcitamente un estado HTTP para indicar un error, la autenticaci\u00f3n puede no fallar, lo que permite al usuario omitir el proceso de autenticaci\u00f3n. No se conocen componentes de autenticaci\u00f3n de Jakarta que se comporten de esta manera. Este problema afecta a Apache Tomcat: desde 11.0.0-M1 hasta 11.0.0-M26, desde 10.1.0-M1 hasta 10.1.30, desde 9.0.0-M1 hasta 9.0.95. Se recomienda a los usuarios que actualicen a la versi\u00f3n 11.0.0, 10.1.31 o 9.0.96, que solucionan el problema.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"security@apache.org\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-391\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-754\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"9.0.0\",\"versionEndExcluding\":\"9.0.96\",\"matchCriteriaId\":\"60FA749D-28A3-49C8-9041-B8E9917A9692\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.1.0\",\"versionEndExcluding\":\"10.1.31\",\"matchCriteriaId\":\"670B1FF2-1D4F-4717-843F-146AB420473F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:11.0.0:milestone1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1AA7FF6-E8E7-4BF6-983E-0A99B0183008\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:11.0.0:milestone10:*:*:*:*:*:*\",\"matchCriteriaId\":\"57088BDD-A136-45EF-A8A1-2EBF79CEC2CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:11.0.0:milestone11:*:*:*:*:*:*\",\"matchCriteriaId\":\"B32D1D7A-A04F-444E-8F45-BB9A9E4B0199\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:11.0.0:milestone12:*:*:*:*:*:*\",\"matchCriteriaId\":\"0092FB35-3B00-484F-A24D-7828396A4FF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:11.0.0:milestone13:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB557E88-FA9D-4B69-AA6F-EAEE7F9B01AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:11.0.0:milestone14:*:*:*:*:*:*\",\"matchCriteriaId\":\"72D3C6F1-84FA-4F82-96C1-9A8DA1C1F30F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:11.0.0:milestone15:*:*:*:*:*:*\",\"matchCriteriaId\":\"3521C81B-37D9-48FC-9540-D0D333B9A4A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:11.0.0:milestone16:*:*:*:*:*:*\",\"matchCriteriaId\":\"02A84634-A8F2-4BA9-B9F3-BEF36AEC5480\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:11.0.0:milestone17:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECBBC1F1-C86B-40AF-B740-A99F6B27682A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:11.0.0:milestone18:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D2206B2-F3FF-43F2-B3E2-3CAAC64C691D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:11.0.0:milestone19:*:*:*:*:*:*\",\"matchCriteriaId\":\"0495A538-4102-40D0-A35C-0179CFD52A9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:11.0.0:milestone2:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AAD52CE-94F5-4F98-A027-9A7E68818CB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:11.0.0:milestone20:*:*:*:*:*:*\",\"matchCriteriaId\":\"77BA6600-0890-4BA1-B447-EC1746BAB4FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:11.0.0:milestone21:*:*:*:*:*:*\",\"matchCriteriaId\":\"7914D26B-CBD6-4846-9BD3-403708D69319\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:11.0.0:milestone22:*:*:*:*:*:*\",\"matchCriteriaId\":\"123C6285-03BE-49FC-B821-8BDB25D02863\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:11.0.0:milestone23:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A28C2E2-B7BC-46CE-94E4-AE3EF172AA47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:11.0.0:milestone24:*:*:*:*:*:*\",\"matchCriteriaId\":\"069B0D8E-8223-4C4E-A834-C6235D6C3450\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:11.0.0:milestone25:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6282085-5716-4874-B0B0-180ECDEE128F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:11.0.0:milestone26:*:*:*:*:*:*\",\"matchCriteriaId\":\"899B6FF0-8701-47E7-8EDA-428A6D48786D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:11.0.0:milestone3:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1F981F5-035A-4EDD-8A9F-481EE8BC7FF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:11.0.0:milestone4:*:*:*:*:*:*\",\"matchCriteriaId\":\"03A171AF-2EC8-4422-912C-547CDB58CAAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:11.0.0:milestone5:*:*:*:*:*:*\",\"matchCriteriaId\":\"538E68C4-0BA4-495F-AEF8-4EF6EE7963CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:11.0.0:milestone6:*:*:*:*:*:*\",\"matchCriteriaId\":\"49350A6E-5E1D-45B2-A874-3B8601B3ADCC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:11.0.0:milestone7:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F50942F-DF54-46C0-8371-9A476DD3EEA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:11.0.0:milestone8:*:*:*:*:*:*\",\"matchCriteriaId\":\"D12C2C95-B79F-4AA4-8CE3-99A3EE7991AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomcat:11.0.0:milestone9:*:*:*:*:*:*\",\"matchCriteriaId\":\"98792138-DD56-42DF-9612-3BDC65EEC117\"}]}]}],\"references\":[{\"url\":\"https://lists.apache.org/thread/lopzlqh91jj9n334g02om08sbysdb928\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\",\"Vendor Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2024/11/18/2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20250124-0003/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"http://www.openwall.com/lists/oss-security/2024/11/18/2\"}, {\"url\": \"https://security.netapp.com/advisory/ntap-20250124-0003/\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-01-24T20:03:09.111Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 9.8, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-52316\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-11-18T14:50:59.890424Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:apache:tomcat:-:*:*:*:*:*:*:*\"], \"vendor\": \"apache\", \"product\": \"tomcat\", \"versions\": [{\"status\": \"affected\", \"version\": \"9.0.0-M1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"9.0.95\"}, {\"status\": \"affected\", \"version\": \"10.1.0-M1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"10.1.30\"}, {\"status\": \"affected\", \"version\": \"11.0.0-M1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"11.0.0-M26\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-11-18T14:53:37.185Z\"}}], \"cna\": {\"title\": \"Apache Tomcat: Authentication bypass when using Jakarta Authentication API\", \"source\": {\"discovery\": \"INTERNAL\"}, \"metrics\": [{\"other\": {\"type\": \"Textual description of severity\", \"content\": {\"text\": \"low\"}}}], \"affected\": [{\"vendor\": \"Apache Software Foundation\", \"product\": \"Apache Tomcat\", \"versions\": [{\"status\": \"affected\", \"version\": \"11.0.0-M1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"11.0.0-M26\"}, {\"status\": \"affected\", \"version\": \"10.1.0-M1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"10.1.30\"}, {\"status\": \"affected\", \"version\": \"9.0.0-M1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"9.0.95\"}, {\"status\": \"affected\", \"version\": \"8.5.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.5.100\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://lists.apache.org/thread/lopzlqh91jj9n334g02om08sbysdb928\", \"tags\": [\"vendor-advisory\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Unchecked Error Condition vulnerability in Apache Tomcat. If Tomcat is configured to use a custom Jakarta Authentication (formerly JASPIC)\\u00a0ServerAuthContext component which may throw an exception during the authentication process without explicitly setting an HTTP status to indicate failure, the authentication may not fail, allowing the user to bypass the authentication process. There are no known Jakarta\\u00a0Authentication components that behave in this way.\\n\\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M26, from 10.1.0-M1 through 10.1.30, from 9.0.0-M1 through 9.0.95.\\n\\nThe following versions were EOL at the time the CVE was created but are \\nknown to be affected: 8.5.0 though 8.5.100.\\n\\n\\nUsers are recommended to upgrade to version 11.0.0, 10.1.31 or 9.0.96, which fix the issue.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003eUnchecked Error Condition vulnerability in Apache Tomcat. If Tomcat is configured to use a custom Jakarta Authentication (formerly JASPIC)\u0026nbsp;ServerAuthContext component which may throw an exception during the authentication process without explicitly setting an HTTP status to indicate failure, the authentication may not fail, allowing the user to bypass the authentication process. There are no known Jakarta\u0026nbsp;Authentication components that behave in this way.\u003c/p\u003e\u003cp\u003eThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M26, from 10.1.0-M1 through 10.1.30, from 9.0.0-M1 through 9.0.95.\u003c/p\u003e\u003cp\u003eThe following versions were EOL at the time the CVE was created but are \\nknown to be affected: 8.5.0 though 8.5.100.\u003cbr\u003e\u003c/p\u003e\u003cp\u003eUsers are recommended to upgrade to version 11.0.0, 10.1.31 or 9.0.96, which fix the issue.\u003c/p\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-391\", \"description\": \"CWE-391 Unchecked Error Condition\"}]}], \"providerMetadata\": {\"orgId\": \"f0158376-9dc2-43b6-827c-5f631a4d8d09\", \"shortName\": \"apache\", \"dateUpdated\": \"2025-08-08T11:20:48.868Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2024-52316\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-08-13T13:30:10.255Z\", \"dateReserved\": \"2024-11-07T07:41:56.639Z\", \"assignerOrgId\": \"f0158376-9dc2-43b6-827c-5f631a4d8d09\", \"datePublished\": \"2024-11-18T11:32:22.072Z\", \"assignerShortName\": \"apache\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
suse-su-2024:4105-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for tomcat10", "title": "Title of the patch" }, { "category": "description", "text": "This update for tomcat10 fixes the following issues:\n\n- Update to Tomcat 10.1.33\n * Fixed CVEs:\n + CVE-2024-52316: If the Jakarta Authentication fails with an exception,\n set a 500 status (bsc#1233434)\n * Catalina\n + Add: Add support for the new Servlet API method HttpServletResponse.sendEarlyHints(). (markt)\n + Add: 55470: Add debug logging that reports the class path when a \n ClassNotFoundException occurs in the digester or the web application class loader. \n Based on a patch by Ralf Hauser. (markt)\n + Update: 69374: Properly separate between table header and body in \n DefaultServlet\u0027s listing. (michaelo)\n + Update: 69373: Make DefaultServlet\u0027s HTML listing file last modified \n rendering better (flexible). (michaelo)\n + Update: Improve HTML output of DefaultServlet. (michaelo)\n + Code: Refactor RateLimitFilter to use FilterBase as the base class. \n The primary advantage is less code to process init-param values. (markt)\n + Update: 69370: DefaultServlet\u0027s HTML listing uses incorrect labels. \n (michaelo)\n + Fix: Avoid NPE in CrawlerSessionManagerValve for partially mapped requests. (remm)\n + Fix: Add missing WebDAV Lock-Token header in the response when locking \n a folder. (remm)\n + Fix: Invalid WebDAV lock requests should be rejected with 400. (remm)\n + Fix: Fix regression in WebDAV when attempting to unlock a collection. (remm)\n + Fix: Verify that destination is not locked for a WebDAV copy operation. (remm)\n + Fix: Send 415 response to WebDAV MKCOL operations that include a request \n body since this is optional and unsupported. (remm)\n + Fix: Enforce DAV: namespace on WebDAV XML elements. (remm)\n + Fix: Do not allow a new WebDAV lock on a child resource if a parent \n collection is locked (RFC 4918 section 6.1). (remm)\n + Fix: WebDAV DELETE should remove any existing lock on successfully \n deleted resources. (remm)\n + Update: Remove WebDAV lock null support in accordance with RFC 4918 \n section 7.3 and annex D. Instead, a lock on a non-existing resource will \n create an empty file locked with a regular lock. (remm)\n + Update: Rewrite implementation of WebDAV shared locks to comply with \n RFC 4918. (remm)\n + Update: Implement WebDAV If header using code from the Apache Jackrabbit \n project. (remm)\n + Add: Add PropertyStore interface in the WebDAV Servlet, to allow \n implementation of dead properties storage. The store used can be configured \n using the propertyStore init parameter of the WebDAV servlet by specifying \n the class name of the store. A simple non-persistent implementation is \n used if no custom store is configured. (remm)\n + Update: Implement WebDAV PROPPATCH method using the newly added \n PropertyStore, and update PROPFIND to support it. (remm)\n + Fix: Cache not found results when searching for web application class \n loader resources. This addresses performance problems caused by components \n such as java.sql.DriverManager, which in some circumstances will search \n for the same class repeatedly. The size of the cache can be controlled \n via the new notFoundClassResourceCacheSize on the StandardContext. (markt)\n + Fix: Stop after INITIALIZED state should be a noop since it is possible \n for subcomponents to be in FAILED after init. (remm)\n + Fix: Fix incorrect web resource cache size calculations when there are \n concurrent PUT and DELETE requests for the same resource. (markt)\n + Add: Add debug logging for the web resource cache so the current size \n can be tracked as resources are added and removed. (markt)\n + Update: Replace legacy WebDAV opaquelocktoken: scheme for lock tokens \n with urn:uuid: as recommended by RFC 4918, and remove secret init \n parameter. (remm)\n + Fix: Concurrent reads and writes (e.g. GET and PUT / DELETE) for the \n same path caused corruption of the FileResource where some of the fields \n were set as if the file exists and some as set as if it does not. This \n resulted in inconsistent metadata. (markt)\n + Fix: 69415: Ensure that the ExpiresFilter only sets cache headers on \n GET and HEAD requests. Also, skip requests where the application has \n set Cache-Control: no-store. (markt)\n + Fix: 69419: Improve the performance of ServletRequest.getAttribute() \n when there are multiple levels of nested includes. Based on a patch \n provided by John Engebretson. (markt)\n + Add: All applications to send an early hints informational response \n by calling HttpServletResponse.sendError() with a status code of 103. \n (schultz)\n + Fix: Ensure that ServerAuthModule.initialize() is called when a \n Jakarta Authentication module is configured via registerServerAuthModule(). \n (markt)\n + Fix: Ensure that the Jakarta Authentication CallbackHandler only creates \n one GenericPrincipal in the Subject. (markt)\n + Fix: If the Jakarta Authentication process fails with an Exception, \n explicitly set the HTTP response status to 500 as the ServerAuthContext \n may not have set it. (markt)\n + Fix: When persisting the Jakarta Authentication provider configuration, \n create any necessary parent directories that don\u0027t already exist. (markt)\n + Fix: Correct the logic used to detect errors when deleting temporary files \n associated with persisting the Jakarta Authentication provider \n configuration. (markt)\n + Fix: When processing Jakarta Authentication callbacks, don\u0027t overwrite \n a Principal obtained from the PasswordValidationCallback with null if the \n CallerPrincipalCallback does not provide a Principal. (markt)\n + Fix: Avoid store config backup loss when storing one configuration more \n than once per second. (remm)\n + Fix: 69359: WebdavServlet duplicates getRelativePath() method from \n super class with incorrect Javadoc. (michaelo)\n + Fix: 69360: Inconsistent DELETE behavior between WebdavServlet and \n DefaultServlet. (michaelo)\n + Fix: Make WebdavServlet properly return the Allow header when deletion \n of a resource is not allowed. (michaelo)\n + Fix: Add log warning if non-wildcard mappings are used with the WebdavServlet. \n (remm)\n + Fix: 69361: Ensure that the order of entries in a multi-status response \n to a WebDAV is consistent with the order in which resources were processed. \n (markt)\n + Fix: 69362: Provide a better multi-status response when deleting a \n collection via WebDAV fails. Empty directories that cannot be deleted \n will now be included in the response. (markt)\n + Fix: 69363: Use getPathPrefix() consistently in the WebDAV servlet to \n ensure that the correct path is used when the WebDAV servlet is mounted \n at a sub-path within the web application. (markt)\n + Fix 69320, a regression in the fix for 69302 that meant the HTTP/2 processing\n was likely to be broken for all clients once any client sent an HTTP/2\n reset frame. (markt)\n + Fix: Improve performance of ApplicationHttpRequest.parseParameters(). \n Based on sample code and test cases provided by John Engebretson. (markt)\n + Fix: Correct regressions in the refactoring that added recycling of the coyote\n request and response to the HTTP/2 processing. (markt)\n + Add: Add support for RFC 8297 (Early Hints). Applications can use this \n feature by casting the HttpServletResponse to org.apache.catalina.connector. \n Response and then calling the method void sendEarlyHints(). This method \n will be added to the Servlet API (removing the need for the cast) in Servlet \n 6.2 onwards. (markt)\n + Fix: 69214: Do not reject a CORS request that uses POST but does not include \n a content-type header. Tomcat now correctly processes this as a simple CORS \n request. Based on a patch suggested by thebluemountain. (markt)\n + Fix: Refactor SpnegoAuthenticator so it uses Subject.callAs() rather than \n Subject.doAs() when available. (markt)\n + Fix: Allow JAASRealm to use the configuration source to load a configured \n configFile, for easier use with testing. (remm)\n + Fix: Add missing algorithm callback to the JAASCallbackHandler. (remm)\n + Fix: Add the OpenSSL version number on the APR and OpenSSL status classes. \n (remm)\n + Fix: 69131: Expand the implementation of the filter value of the Authenticator \n attribute allowCorsPreflight, so that it applies to all requests that match \n the configured URL patterns for the CORS filter, rather than only applying \n if the CORS filter is mapped to /*. (markt)\n + Fix: Using the OpenSSLListener will now cause the connector to use OpenSSL \n if available. (remm)\n * Coyote\n + Fix: Return null SSL session id on zero-length byte array returned \n from the SSL implementation. (remm)\n + Fix: Skip OpenSSLConf with BoringSSL since it is unsupported. (remm)\n + Fix: Create the HttpParser in Http11Processor if it is not present on \n the AbstractHttp11Protocol to provide better lifecycle robustness for \n regular HTTP/1.1. The new behavior was introduced in a previous refactoring \n to improve HTTP/2 performance. (remm)\n + Fix: OpenSSLContext will now throw a KeyManagementException if something \n is known to have gone wrong in the init method, which is the behavior \n documented by javax.net.ssl.SSLContext.init. This makes error handling \n more consistent. (remm)\n + Fix: 69379: The default HEAD response no longer includes the payload \n HTTP header fields as per section 9.3.2 of RFC 9110. (markt)\n + Fix: 69316: Ensure that FastHttpDateFormat#getCurrentDate() (used to \n generate Date headers for HTTP responses) generates the correct string \n for the given input. Prior to this change, the output may have been \n wrong by one second in some cases. Pull request #751 provided by Chenjp. \n (markt)\n + Fix: Request start time may not have been accurately recorded for HTTP/1.1 \n requests preceded by a large number of blank lines. (markt)\n + Add: Add server and serverRemoveAppProvidedValues to the list of attributes \n the HTTP/2 protocol will inherit from the HTTP/1.1 connector it is nested \n within. (markt)\n + Fix: Avoid possible crashes when using Apache Tomcat Native, caused by \n destroying SSLContext objects through GC after APR has been terminated. \n (remm)\n + Fix: Improve HTTP/2 handling of trailer fields for requests. Trailer fields \n no longer need to be received before the headers of the subsequent stream, \n nor are trailer fields for an in-progress stream swallowed if the Connector \n is paused before the trailer fields are received. (markt)\n + Fix: Ensure the request and response are not recycled too soon for an \n HTTP/2 stream when a stream-level error is detected during the processing \n of incoming HTTP/2 frames. This could lead to incorrect processing times \n appearing in the access log. (markt)\n + Fix: Correct a regression in the fix for non-blocking reads of chunked \n request bodies that caused InputStream.available() to return a non-zero \n value when there was no data to read. In some circumstances this could \n cause a blocking read to block waiting for more data rather than return \n the data it had already received. (markt)\n + Add: Add a new attribute cookiesWithoutEquals to the Rfc6265CookieProcessor. \n The default behaviour is unchanged. (markt)\n + Fix: Ensure that Tomcat sends a TLS close_notify message after receiving \n one from the client when using the OpenSSLImplementation. (markt)\n + Fix: 69301: Fix trailer headers replacing non-trailer headers when writing \n response headers to the access log. Based on a patch and test case \n provided by hypnoce. (markt)\n + Fix: 69302: If an HTTP/2 client resets a stream before the request body \n is fully written, ensure that any ReadListener is notified via a call \n to ReadListener.onError(). (markt)\n + Fix: Ensure that HTTP/2 stream input buffers are only created when there is \n a request body to be read. (markt)\n + Code: Refactor creation of HttpParser instances from the Processor level to \n the Protocol level since the parser configuration depends on the protocol \n and the parser is, otherwise, stateless. (markt)\n + Add: Align HTTP/2 with HTTP/1.1 and recycle the container internal request \n and response processing objects by default. This behaviour can be controlled \n via the new discardRequestsAndResponses attribute on the HTTP/2 upgrade protocol. \n (markt)\n + Fix: Clean and log OpenSSL errors before processing of OpenSSL conf commands \n in the FFM code. (remm)\n + Fix: 69121: Ensure that the onComplete() event is triggered if AsyncListener.\n onError() dispatches to a target that throws an exception. (markt)\n + Fix: Following the trailer header field refactoring, -1 is no longer an allowed \n value for maxTrailerSize. Adjust documentation accordingly. (remm)\n + Update: Move OpenSSL support using FFM to a separate JAR named tomcat-coyote-ffm.\n jar that advertises Java 22 in its manifest. (remm)\n + Fix: Fix search for OpenSSL library for FFM on Mac OS so that java.library.path \n is searched. (markt)\n + Update: Add FFM compatibility methods for LibreSSL support. Renegotiation is \n not supported at the moment. (remm)\n + Update: Add org.apache.tomcat.util.openssl.LIBRARY_NAME (specifies the name \n of the library to load) and org.apache.tomcat.util.openssl.USE_SYSTEM_LOAD_LIBRARY \n (set to true to use System.loadLibrary rather than the FFM library loading code) \n to configure the OpenSSL library loading using FFM. (remm)\n + Update: Add FFM compatibility methods for BoringSSL support. Renegotiation is \n not supported in many cases. (remm)\n * Jasper\n + Fix: Add back tag release method as deprecated in the runtime for \n compatibility with old generated code. (remm)\n + Fix: 69399: Fix regression caused by improvement 69333, which caused \n the tag release to be called when using tag pooling, and to be skipped \n when not using it. Patch submitted by Michal Sobkiewicz. (remm)\n + Fix: 69381: Improve method lookup performance in expression language. \n When the required method has no arguments, there is no need to consider \n casting or coercion, and the method lookup process can be simplified. \n Based on a pull request by John Engebretson. (markt)\n + Fix: 69382: Improve the performance of the JSP include action by re-using \n results of relatively expensive method calls in the generated code rather \n than repeating them. Patch provided by John Engebretson. (markt)\n + Fix: 69398: Avoid unnecessary object allocation in PageContextImpl. \n Based on a suggestion by John Engebretson. (markt)\n + Fix: 69406: When using StringInterpreterEnum, do not throw an \n IllegalArgumentException when an invalid Enum is encountered. Instead, \n resolve the value at runtime. Patch provided by John Engebretson. (markt)\n + Fix: 69429: Optimize EL evaluation of method parameters for methods \n that do not accept any parameters. Patch provided by John Engebretson. (markt)\n + Fix: Further optimize EL evaluation of method parameters. Patch provided \n by Paolo B. (markt)\n + Fix: 69333: Remove unnecessary code from generated JSPs. (markt)\n + Fix: 69338: Improve the performance of processing expressions that include \n AND or OR operations with more than two operands and expressions that use \n not empty. (markt)\n + Fix: 69348: Reduce memory consumption in ELContext by using lazy \n initialization for the data structure used to track lambda arguments. (markt)\n + Fix: Switch the TldScanner back to logging detailed scan results at debug \n level rather than trace level. (markt)\n + Fix: Update the optimisation in jakarta.el.ImportHandler so it is aware of \n new classes added to the java.lang package in Java 23. (markt)\n + Fix: Ensure that an exception in toString() still results in an ELException \n when an object is coerced to a String using ExpressionFactory.coerceToType(). \n (markt)\n + Add: Add support for specifying Java 24 (with the value 24) as the compiler \n source and/or compiler target for JSP compilation. If used with an Eclipse JDT \n compiler version that does not support these values, a warning will be logged \n and the default will be used. (markt)\n + Fix: 69135: When using include directives in a tag file packaged in a JAR file, \n ensure that context relative includes are processed correctly. (markt)\n + Fix: 69135: When using include directives in a tag file packaged in a JAR file, \n ensure that file relative includes are processed correctly. (markt)\n + Fix: 69135: When using include directives in a tag file packaged in a JAR file, \n ensure that file relative includes are not permitted to access files outside \n of the /META_INF/tags/ directory nor outside of the JAR file. (markt)\n * WebSocket\n + Fix: If a blocking message write exceeds the timeout, don\u0027t attempt the \n write again before throwing the exception. (markt)\n + Fix: An EncodeException being thrown during a message write should not \n automatically cause the connection to close. The application should handle \n the exception and make the decision whether or not to close the connection. \n (markt)\n * Web applications\n + Fix: The manager webapp will now be able to access certificates again \n when OpenSSL is used. (remm)\n + Fix: Documentation. Align the logging configuration documentation with \n the current defaults. (markt)\n + Fix: Fix status servlet detailed view of the connectors when using automatic \n port. (remm)\n * jdbc-pool\n + Fix: 69255: Correct a regression in the fix for 69206 that meant exceptions \n executing statements were wrapped in a java.lang.reflect.UndeclaredThrowableException \n rather than the application seeing the original SQLException. Fixed by pull \n request #744 provided by Michael Clarke. (markt)\n + Fix: 69279: Correct a regression in the fix for 69206 that meant that methods \n that previously returned a null ResultSet were returning a proxy with a \n null delegate. Fixed by pull request #745 provided by Huub de Beer. (markt)\n + Fix: 69206: Ensure statements returned from Statement methods executeQuery(), \n getResultSet() and getGeneratedKeys() are correctly wrapped before being returned \n to the caller. Based on pull request #742 provided by Michael Clarke. (markt)\n * Other\n + Update: Switch from DigiCert ONE to ssl.com eSigner for code signing. (markt)\n + Update: Update Byte Buddy to 1.15.10. (markt)\n + Update: Update CheckStyle to 10.20.0. (markt)\n + Add: Improvements to German translations. (remm)\n + Update: Update Byte Buddy to 1.15.3. (markt)\n + Update: Update CheckStyle to 10.18.2. (markt)\n + Add: Improvements to French translations. (remm)\n + Add: Improvements to Japanese translations by tak7iji. (markt)\n + Add: Improvements to Chinese translations by Ch_jp. (markt)\n + Add: Exclude the tomcat-coyote-ffm.jar from JAR scanning by default. (markt)\n + Fix: Change the default log handler level to ALL so log messages are not \n dropped by default if a logger is configured to use trace (FINEST) level \n logging. (markt)\n + Update: Update Hamcrest to 3.0. (markt)\n + Update: Update EasyMock to 5.4.0. (markt)\n + Update: Update Byte Buddy to 1.15.0. (markt)\n + Update: Update CheckStyle to 10.18.0. (markt)\n + Update: Update the internal fork of Apache Commons BCEL to 6.10.0. (markt)\n + Add: Improvements to Spanish translations by Fernando. (markt)\n + Add: Improvements to French translations. (remm)\n + Add: Improvements to Japanese translations by tak7iji. (markt)\n + Fix: Fix packaging regression with missing osgi information following addition \n of the test-only build target. (remm)\n + Update: Update Tomcat Native to 2.0.8. (markt)\n + Update: Update Byte Buddy to 1.14.18. (markt)\n + Add: Improvements to French translations. (remm)\n + Add: Improvements to Japanese translations by tak7iji. (markt)\n + Update: Add test-only build target to allow running only the testsuite, \n supporting Java versions down to the minimum supported to run Tomcat. (rjung)\n + Update: Update UnboundID to 7.0.1. (markt)\n + Update: Update to SpotBugs 4.8.6. (markt)\n + Update: Remove cglib dependency as it is not required by the version of EasyMock \n used by the unit tests. (markt)\n + Update: Update EasyMock to 5.3.0. This adds a test dependency on Byte-Buddy \n 1.14.17. (markt)\n + Add: Improvements to Czech translations by Vladimr Chlup. (markt)\n + Add: Improvements to French translations. (remm)\n + Add: Improvements to Japanese translations by tak7iji. (markt)\n + Add: Improvements to Chinese translations by fangzheng. (markt)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2024-4105,SUSE-SLE-Module-Web-Scripting-15-SP5-2024-4105,SUSE-SLE-Module-Web-Scripting-15-SP6-2024-4105,openSUSE-SLE-15.5-2024-4105,openSUSE-SLE-15.6-2024-4105", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_4105-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2024:4105-1", "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20244105-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2024:4105-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019867.html" }, { "category": "self", "summary": "SUSE Bug 1233434", "url": "https://bugzilla.suse.com/1233434" }, { "category": "self", "summary": "SUSE CVE CVE-2024-52316 page", "url": "https://www.suse.com/security/cve/CVE-2024-52316/" } ], "title": "Security update for tomcat10", "tracking": { "current_release_date": "2024-11-28T15:09:14Z", "generator": { "date": "2024-11-28T15:09:14Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2024:4105-1", "initial_release_date": "2024-11-28T15:09:14Z", "revision_history": [ { "date": "2024-11-28T15:09:14Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "tomcat10-10.1.33-150200.5.28.1.noarch", "product": { "name": "tomcat10-10.1.33-150200.5.28.1.noarch", "product_id": "tomcat10-10.1.33-150200.5.28.1.noarch" } }, { "category": "product_version", "name": "tomcat10-admin-webapps-10.1.33-150200.5.28.1.noarch", "product": { "name": "tomcat10-admin-webapps-10.1.33-150200.5.28.1.noarch", "product_id": "tomcat10-admin-webapps-10.1.33-150200.5.28.1.noarch" } }, { "category": "product_version", "name": "tomcat10-doc-10.1.33-150200.5.28.1.noarch", "product": { "name": "tomcat10-doc-10.1.33-150200.5.28.1.noarch", "product_id": "tomcat10-doc-10.1.33-150200.5.28.1.noarch" } }, { "category": "product_version", "name": "tomcat10-docs-webapp-10.1.33-150200.5.28.1.noarch", "product": { "name": "tomcat10-docs-webapp-10.1.33-150200.5.28.1.noarch", "product_id": "tomcat10-docs-webapp-10.1.33-150200.5.28.1.noarch" } }, { "category": "product_version", "name": "tomcat10-el-5_0-api-10.1.33-150200.5.28.1.noarch", "product": { "name": "tomcat10-el-5_0-api-10.1.33-150200.5.28.1.noarch", "product_id": "tomcat10-el-5_0-api-10.1.33-150200.5.28.1.noarch" } }, { "category": "product_version", "name": "tomcat10-embed-10.1.33-150200.5.28.1.noarch", "product": { "name": "tomcat10-embed-10.1.33-150200.5.28.1.noarch", "product_id": "tomcat10-embed-10.1.33-150200.5.28.1.noarch" } }, { "category": "product_version", "name": "tomcat10-jsp-3_1-api-10.1.33-150200.5.28.1.noarch", "product": { "name": "tomcat10-jsp-3_1-api-10.1.33-150200.5.28.1.noarch", "product_id": "tomcat10-jsp-3_1-api-10.1.33-150200.5.28.1.noarch" } }, { "category": "product_version", "name": "tomcat10-jsvc-10.1.33-150200.5.28.1.noarch", "product": { "name": "tomcat10-jsvc-10.1.33-150200.5.28.1.noarch", "product_id": "tomcat10-jsvc-10.1.33-150200.5.28.1.noarch" } }, { "category": "product_version", "name": "tomcat10-lib-10.1.33-150200.5.28.1.noarch", "product": { "name": "tomcat10-lib-10.1.33-150200.5.28.1.noarch", "product_id": "tomcat10-lib-10.1.33-150200.5.28.1.noarch" } }, { "category": "product_version", "name": "tomcat10-servlet-6_0-api-10.1.33-150200.5.28.1.noarch", "product": { "name": "tomcat10-servlet-6_0-api-10.1.33-150200.5.28.1.noarch", "product_id": "tomcat10-servlet-6_0-api-10.1.33-150200.5.28.1.noarch" } }, { "category": "product_version", "name": "tomcat10-webapps-10.1.33-150200.5.28.1.noarch", "product": { "name": "tomcat10-webapps-10.1.33-150200.5.28.1.noarch", "product_id": "tomcat10-webapps-10.1.33-150200.5.28.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Web and Scripting 15 SP5", "product": { "name": "SUSE Linux Enterprise Module for Web and Scripting 15 SP5", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-web-scripting:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product": { "name": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-web-scripting:15:sp6" } } }, { "category": "product_name", "name": "openSUSE Leap 15.5", "product": { "name": "openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.5" } } }, { "category": "product_name", "name": "openSUSE Leap 15.6", "product": { "name": "openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.6" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tomcat10-10.1.33-150200.5.28.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP5", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-10.1.33-150200.5.28.1.noarch" }, "product_reference": "tomcat10-10.1.33-150200.5.28.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-admin-webapps-10.1.33-150200.5.28.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP5", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-admin-webapps-10.1.33-150200.5.28.1.noarch" }, "product_reference": "tomcat10-admin-webapps-10.1.33-150200.5.28.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-el-5_0-api-10.1.33-150200.5.28.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP5", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-el-5_0-api-10.1.33-150200.5.28.1.noarch" }, "product_reference": "tomcat10-el-5_0-api-10.1.33-150200.5.28.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-jsp-3_1-api-10.1.33-150200.5.28.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP5", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-jsp-3_1-api-10.1.33-150200.5.28.1.noarch" }, "product_reference": "tomcat10-jsp-3_1-api-10.1.33-150200.5.28.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-lib-10.1.33-150200.5.28.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP5", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-lib-10.1.33-150200.5.28.1.noarch" }, "product_reference": "tomcat10-lib-10.1.33-150200.5.28.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-servlet-6_0-api-10.1.33-150200.5.28.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP5", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-servlet-6_0-api-10.1.33-150200.5.28.1.noarch" }, "product_reference": "tomcat10-servlet-6_0-api-10.1.33-150200.5.28.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-webapps-10.1.33-150200.5.28.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP5", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-webapps-10.1.33-150200.5.28.1.noarch" }, "product_reference": "tomcat10-webapps-10.1.33-150200.5.28.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-10.1.33-150200.5.28.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.33-150200.5.28.1.noarch" }, "product_reference": "tomcat10-10.1.33-150200.5.28.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-admin-webapps-10.1.33-150200.5.28.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.33-150200.5.28.1.noarch" }, "product_reference": "tomcat10-admin-webapps-10.1.33-150200.5.28.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-el-5_0-api-10.1.33-150200.5.28.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.33-150200.5.28.1.noarch" }, "product_reference": "tomcat10-el-5_0-api-10.1.33-150200.5.28.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-jsp-3_1-api-10.1.33-150200.5.28.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.33-150200.5.28.1.noarch" }, "product_reference": "tomcat10-jsp-3_1-api-10.1.33-150200.5.28.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-lib-10.1.33-150200.5.28.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.33-150200.5.28.1.noarch" }, "product_reference": "tomcat10-lib-10.1.33-150200.5.28.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-servlet-6_0-api-10.1.33-150200.5.28.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.33-150200.5.28.1.noarch" }, "product_reference": "tomcat10-servlet-6_0-api-10.1.33-150200.5.28.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-webapps-10.1.33-150200.5.28.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.33-150200.5.28.1.noarch" }, "product_reference": "tomcat10-webapps-10.1.33-150200.5.28.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-10.1.33-150200.5.28.1.noarch as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:tomcat10-10.1.33-150200.5.28.1.noarch" }, "product_reference": "tomcat10-10.1.33-150200.5.28.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-admin-webapps-10.1.33-150200.5.28.1.noarch as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:tomcat10-admin-webapps-10.1.33-150200.5.28.1.noarch" }, "product_reference": "tomcat10-admin-webapps-10.1.33-150200.5.28.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-docs-webapp-10.1.33-150200.5.28.1.noarch as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:tomcat10-docs-webapp-10.1.33-150200.5.28.1.noarch" }, "product_reference": "tomcat10-docs-webapp-10.1.33-150200.5.28.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-el-5_0-api-10.1.33-150200.5.28.1.noarch as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:tomcat10-el-5_0-api-10.1.33-150200.5.28.1.noarch" }, "product_reference": "tomcat10-el-5_0-api-10.1.33-150200.5.28.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-embed-10.1.33-150200.5.28.1.noarch as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:tomcat10-embed-10.1.33-150200.5.28.1.noarch" }, "product_reference": "tomcat10-embed-10.1.33-150200.5.28.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-jsp-3_1-api-10.1.33-150200.5.28.1.noarch as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:tomcat10-jsp-3_1-api-10.1.33-150200.5.28.1.noarch" }, "product_reference": "tomcat10-jsp-3_1-api-10.1.33-150200.5.28.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-jsvc-10.1.33-150200.5.28.1.noarch as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:tomcat10-jsvc-10.1.33-150200.5.28.1.noarch" }, "product_reference": "tomcat10-jsvc-10.1.33-150200.5.28.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-lib-10.1.33-150200.5.28.1.noarch as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:tomcat10-lib-10.1.33-150200.5.28.1.noarch" }, "product_reference": "tomcat10-lib-10.1.33-150200.5.28.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-servlet-6_0-api-10.1.33-150200.5.28.1.noarch as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:tomcat10-servlet-6_0-api-10.1.33-150200.5.28.1.noarch" }, "product_reference": "tomcat10-servlet-6_0-api-10.1.33-150200.5.28.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-webapps-10.1.33-150200.5.28.1.noarch as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:tomcat10-webapps-10.1.33-150200.5.28.1.noarch" }, "product_reference": "tomcat10-webapps-10.1.33-150200.5.28.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-10.1.33-150200.5.28.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat10-10.1.33-150200.5.28.1.noarch" }, "product_reference": "tomcat10-10.1.33-150200.5.28.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-admin-webapps-10.1.33-150200.5.28.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.33-150200.5.28.1.noarch" }, "product_reference": "tomcat10-admin-webapps-10.1.33-150200.5.28.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-doc-10.1.33-150200.5.28.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat10-doc-10.1.33-150200.5.28.1.noarch" }, "product_reference": "tomcat10-doc-10.1.33-150200.5.28.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-docs-webapp-10.1.33-150200.5.28.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.33-150200.5.28.1.noarch" }, "product_reference": "tomcat10-docs-webapp-10.1.33-150200.5.28.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-el-5_0-api-10.1.33-150200.5.28.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.33-150200.5.28.1.noarch" }, "product_reference": "tomcat10-el-5_0-api-10.1.33-150200.5.28.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-embed-10.1.33-150200.5.28.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat10-embed-10.1.33-150200.5.28.1.noarch" }, "product_reference": "tomcat10-embed-10.1.33-150200.5.28.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-jsp-3_1-api-10.1.33-150200.5.28.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.33-150200.5.28.1.noarch" }, "product_reference": "tomcat10-jsp-3_1-api-10.1.33-150200.5.28.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-jsvc-10.1.33-150200.5.28.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat10-jsvc-10.1.33-150200.5.28.1.noarch" }, "product_reference": "tomcat10-jsvc-10.1.33-150200.5.28.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-lib-10.1.33-150200.5.28.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat10-lib-10.1.33-150200.5.28.1.noarch" }, "product_reference": "tomcat10-lib-10.1.33-150200.5.28.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-servlet-6_0-api-10.1.33-150200.5.28.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.33-150200.5.28.1.noarch" }, "product_reference": "tomcat10-servlet-6_0-api-10.1.33-150200.5.28.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-webapps-10.1.33-150200.5.28.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat10-webapps-10.1.33-150200.5.28.1.noarch" }, "product_reference": "tomcat10-webapps-10.1.33-150200.5.28.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-52316", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-52316" } ], "notes": [ { "category": "general", "text": "Unchecked Error Condition vulnerability in Apache Tomcat. If Tomcat is configured to use a custom Jakarta Authentication (formerly JASPIC) ServerAuthContext component which may throw an exception during the authentication process without explicitly setting an HTTP status to indicate failure, the authentication may not fail, allowing the user to bypass the authentication process. There are no known Jakarta Authentication components that behave in this way.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M26, from 10.1.0-M1 through 10.1.30, from 9.0.0-M1 through 9.0.95.\n\nThe following versions were EOL at the time the CVE was created but are \nknown to be affected: 8.5.0 though 8.5.100.\n\n\nUsers are recommended to upgrade to version 11.0.0, 10.1.31 or 9.0.96, which fix the issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-10.1.33-150200.5.28.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-admin-webapps-10.1.33-150200.5.28.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-el-5_0-api-10.1.33-150200.5.28.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-jsp-3_1-api-10.1.33-150200.5.28.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-lib-10.1.33-150200.5.28.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-servlet-6_0-api-10.1.33-150200.5.28.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-webapps-10.1.33-150200.5.28.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.33-150200.5.28.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.33-150200.5.28.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.33-150200.5.28.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.33-150200.5.28.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.33-150200.5.28.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.33-150200.5.28.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.33-150200.5.28.1.noarch", "openSUSE Leap 15.5:tomcat10-10.1.33-150200.5.28.1.noarch", "openSUSE Leap 15.5:tomcat10-admin-webapps-10.1.33-150200.5.28.1.noarch", "openSUSE Leap 15.5:tomcat10-docs-webapp-10.1.33-150200.5.28.1.noarch", "openSUSE Leap 15.5:tomcat10-el-5_0-api-10.1.33-150200.5.28.1.noarch", "openSUSE Leap 15.5:tomcat10-embed-10.1.33-150200.5.28.1.noarch", "openSUSE Leap 15.5:tomcat10-jsp-3_1-api-10.1.33-150200.5.28.1.noarch", "openSUSE Leap 15.5:tomcat10-jsvc-10.1.33-150200.5.28.1.noarch", "openSUSE Leap 15.5:tomcat10-lib-10.1.33-150200.5.28.1.noarch", "openSUSE Leap 15.5:tomcat10-servlet-6_0-api-10.1.33-150200.5.28.1.noarch", "openSUSE Leap 15.5:tomcat10-webapps-10.1.33-150200.5.28.1.noarch", "openSUSE Leap 15.6:tomcat10-10.1.33-150200.5.28.1.noarch", "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.33-150200.5.28.1.noarch", "openSUSE Leap 15.6:tomcat10-doc-10.1.33-150200.5.28.1.noarch", "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.33-150200.5.28.1.noarch", "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.33-150200.5.28.1.noarch", "openSUSE Leap 15.6:tomcat10-embed-10.1.33-150200.5.28.1.noarch", "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.33-150200.5.28.1.noarch", "openSUSE Leap 15.6:tomcat10-jsvc-10.1.33-150200.5.28.1.noarch", "openSUSE Leap 15.6:tomcat10-lib-10.1.33-150200.5.28.1.noarch", "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.33-150200.5.28.1.noarch", "openSUSE Leap 15.6:tomcat10-webapps-10.1.33-150200.5.28.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-52316", "url": "https://www.suse.com/security/cve/CVE-2024-52316" }, { "category": "external", "summary": "SUSE Bug 1233434 for CVE-2024-52316", "url": "https://bugzilla.suse.com/1233434" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-10.1.33-150200.5.28.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-admin-webapps-10.1.33-150200.5.28.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-el-5_0-api-10.1.33-150200.5.28.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-jsp-3_1-api-10.1.33-150200.5.28.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-lib-10.1.33-150200.5.28.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-servlet-6_0-api-10.1.33-150200.5.28.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-webapps-10.1.33-150200.5.28.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.33-150200.5.28.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.33-150200.5.28.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.33-150200.5.28.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.33-150200.5.28.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.33-150200.5.28.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.33-150200.5.28.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.33-150200.5.28.1.noarch", "openSUSE Leap 15.5:tomcat10-10.1.33-150200.5.28.1.noarch", "openSUSE Leap 15.5:tomcat10-admin-webapps-10.1.33-150200.5.28.1.noarch", "openSUSE Leap 15.5:tomcat10-docs-webapp-10.1.33-150200.5.28.1.noarch", "openSUSE Leap 15.5:tomcat10-el-5_0-api-10.1.33-150200.5.28.1.noarch", "openSUSE Leap 15.5:tomcat10-embed-10.1.33-150200.5.28.1.noarch", "openSUSE Leap 15.5:tomcat10-jsp-3_1-api-10.1.33-150200.5.28.1.noarch", "openSUSE Leap 15.5:tomcat10-jsvc-10.1.33-150200.5.28.1.noarch", "openSUSE Leap 15.5:tomcat10-lib-10.1.33-150200.5.28.1.noarch", "openSUSE Leap 15.5:tomcat10-servlet-6_0-api-10.1.33-150200.5.28.1.noarch", "openSUSE Leap 15.5:tomcat10-webapps-10.1.33-150200.5.28.1.noarch", "openSUSE Leap 15.6:tomcat10-10.1.33-150200.5.28.1.noarch", "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.33-150200.5.28.1.noarch", "openSUSE Leap 15.6:tomcat10-doc-10.1.33-150200.5.28.1.noarch", "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.33-150200.5.28.1.noarch", "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.33-150200.5.28.1.noarch", "openSUSE Leap 15.6:tomcat10-embed-10.1.33-150200.5.28.1.noarch", "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.33-150200.5.28.1.noarch", "openSUSE Leap 15.6:tomcat10-jsvc-10.1.33-150200.5.28.1.noarch", "openSUSE Leap 15.6:tomcat10-lib-10.1.33-150200.5.28.1.noarch", "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.33-150200.5.28.1.noarch", "openSUSE Leap 15.6:tomcat10-webapps-10.1.33-150200.5.28.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-10.1.33-150200.5.28.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-admin-webapps-10.1.33-150200.5.28.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-el-5_0-api-10.1.33-150200.5.28.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-jsp-3_1-api-10.1.33-150200.5.28.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-lib-10.1.33-150200.5.28.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-servlet-6_0-api-10.1.33-150200.5.28.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-webapps-10.1.33-150200.5.28.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.33-150200.5.28.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.33-150200.5.28.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.33-150200.5.28.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.33-150200.5.28.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.33-150200.5.28.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.33-150200.5.28.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.33-150200.5.28.1.noarch", "openSUSE Leap 15.5:tomcat10-10.1.33-150200.5.28.1.noarch", "openSUSE Leap 15.5:tomcat10-admin-webapps-10.1.33-150200.5.28.1.noarch", "openSUSE Leap 15.5:tomcat10-docs-webapp-10.1.33-150200.5.28.1.noarch", "openSUSE Leap 15.5:tomcat10-el-5_0-api-10.1.33-150200.5.28.1.noarch", "openSUSE Leap 15.5:tomcat10-embed-10.1.33-150200.5.28.1.noarch", "openSUSE Leap 15.5:tomcat10-jsp-3_1-api-10.1.33-150200.5.28.1.noarch", "openSUSE Leap 15.5:tomcat10-jsvc-10.1.33-150200.5.28.1.noarch", "openSUSE Leap 15.5:tomcat10-lib-10.1.33-150200.5.28.1.noarch", "openSUSE Leap 15.5:tomcat10-servlet-6_0-api-10.1.33-150200.5.28.1.noarch", "openSUSE Leap 15.5:tomcat10-webapps-10.1.33-150200.5.28.1.noarch", "openSUSE Leap 15.6:tomcat10-10.1.33-150200.5.28.1.noarch", "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.33-150200.5.28.1.noarch", "openSUSE Leap 15.6:tomcat10-doc-10.1.33-150200.5.28.1.noarch", "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.33-150200.5.28.1.noarch", "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.33-150200.5.28.1.noarch", "openSUSE Leap 15.6:tomcat10-embed-10.1.33-150200.5.28.1.noarch", "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.33-150200.5.28.1.noarch", "openSUSE Leap 15.6:tomcat10-jsvc-10.1.33-150200.5.28.1.noarch", "openSUSE Leap 15.6:tomcat10-lib-10.1.33-150200.5.28.1.noarch", "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.33-150200.5.28.1.noarch", "openSUSE Leap 15.6:tomcat10-webapps-10.1.33-150200.5.28.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-11-28T15:09:14Z", "details": "critical" } ], "title": "CVE-2024-52316" } ] }
suse-su-2024:4075-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for tomcat", "title": "Title of the patch" }, { "category": "description", "text": "This update for tomcat fixes the following issues:\n\n- CVE-2024-52316: Fixed an authentication bypass when using Jakarta Authentication API (bsc#1233434).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2024-4075,SUSE-SLE-SERVER-12-SP5-LTSS-2024-4075,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2024-4075", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_4075-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2024:4075-1", "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20244075-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2024:4075-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019848.html" }, { "category": "self", "summary": "SUSE Bug 1233434", "url": "https://bugzilla.suse.com/1233434" }, { "category": "self", "summary": "SUSE CVE CVE-2024-52316 page", "url": "https://www.suse.com/security/cve/CVE-2024-52316/" } ], "title": "Security update for tomcat", "tracking": { "current_release_date": "2024-11-27T08:34:49Z", "generator": { "date": "2024-11-27T08:34:49Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2024:4075-1", "initial_release_date": "2024-11-27T08:34:49Z", "revision_history": [ { "date": "2024-11-27T08:34:49Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "tomcat-9.0.36-3.133.1.noarch", "product": { "name": "tomcat-9.0.36-3.133.1.noarch", "product_id": "tomcat-9.0.36-3.133.1.noarch" } }, { "category": "product_version", "name": "tomcat-admin-webapps-9.0.36-3.133.1.noarch", "product": { "name": "tomcat-admin-webapps-9.0.36-3.133.1.noarch", "product_id": "tomcat-admin-webapps-9.0.36-3.133.1.noarch" } }, { "category": "product_version", "name": "tomcat-docs-webapp-9.0.36-3.133.1.noarch", "product": { "name": "tomcat-docs-webapp-9.0.36-3.133.1.noarch", "product_id": "tomcat-docs-webapp-9.0.36-3.133.1.noarch" } }, { "category": "product_version", "name": "tomcat-el-3_0-api-9.0.36-3.133.1.noarch", "product": { "name": "tomcat-el-3_0-api-9.0.36-3.133.1.noarch", "product_id": "tomcat-el-3_0-api-9.0.36-3.133.1.noarch" } }, { "category": "product_version", "name": "tomcat-embed-9.0.36-3.133.1.noarch", "product": { "name": "tomcat-embed-9.0.36-3.133.1.noarch", "product_id": "tomcat-embed-9.0.36-3.133.1.noarch" } }, { "category": "product_version", "name": "tomcat-javadoc-9.0.36-3.133.1.noarch", "product": { "name": "tomcat-javadoc-9.0.36-3.133.1.noarch", "product_id": "tomcat-javadoc-9.0.36-3.133.1.noarch" } }, { "category": "product_version", "name": "tomcat-jsp-2_3-api-9.0.36-3.133.1.noarch", "product": { "name": "tomcat-jsp-2_3-api-9.0.36-3.133.1.noarch", "product_id": "tomcat-jsp-2_3-api-9.0.36-3.133.1.noarch" } }, { "category": "product_version", "name": "tomcat-jsvc-9.0.36-3.133.1.noarch", "product": { "name": "tomcat-jsvc-9.0.36-3.133.1.noarch", "product_id": "tomcat-jsvc-9.0.36-3.133.1.noarch" } }, { "category": "product_version", "name": "tomcat-lib-9.0.36-3.133.1.noarch", "product": { "name": "tomcat-lib-9.0.36-3.133.1.noarch", "product_id": "tomcat-lib-9.0.36-3.133.1.noarch" } }, { "category": "product_version", "name": "tomcat-servlet-4_0-api-9.0.36-3.133.1.noarch", "product": { "name": "tomcat-servlet-4_0-api-9.0.36-3.133.1.noarch", "product_id": "tomcat-servlet-4_0-api-9.0.36-3.133.1.noarch" } }, { "category": "product_version", "name": "tomcat-webapps-9.0.36-3.133.1.noarch", "product": { "name": "tomcat-webapps-9.0.36-3.133.1.noarch", "product_id": "tomcat-webapps-9.0.36-3.133.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP5-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product": { "name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss-extended-security:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.36-3.133.1.noarch as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:tomcat-9.0.36-3.133.1.noarch" }, "product_reference": "tomcat-9.0.36-3.133.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.36-3.133.1.noarch as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:tomcat-admin-webapps-9.0.36-3.133.1.noarch" }, "product_reference": "tomcat-admin-webapps-9.0.36-3.133.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-docs-webapp-9.0.36-3.133.1.noarch as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:tomcat-docs-webapp-9.0.36-3.133.1.noarch" }, "product_reference": "tomcat-docs-webapp-9.0.36-3.133.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.36-3.133.1.noarch as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:tomcat-el-3_0-api-9.0.36-3.133.1.noarch" }, "product_reference": "tomcat-el-3_0-api-9.0.36-3.133.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-javadoc-9.0.36-3.133.1.noarch as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:tomcat-javadoc-9.0.36-3.133.1.noarch" }, "product_reference": "tomcat-javadoc-9.0.36-3.133.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.36-3.133.1.noarch as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:tomcat-jsp-2_3-api-9.0.36-3.133.1.noarch" }, "product_reference": "tomcat-jsp-2_3-api-9.0.36-3.133.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.36-3.133.1.noarch as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:tomcat-lib-9.0.36-3.133.1.noarch" }, "product_reference": "tomcat-lib-9.0.36-3.133.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.36-3.133.1.noarch as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:tomcat-servlet-4_0-api-9.0.36-3.133.1.noarch" }, "product_reference": "tomcat-servlet-4_0-api-9.0.36-3.133.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.36-3.133.1.noarch as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:tomcat-webapps-9.0.36-3.133.1.noarch" }, "product_reference": "tomcat-webapps-9.0.36-3.133.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.36-3.133.1.noarch as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:tomcat-9.0.36-3.133.1.noarch" }, "product_reference": "tomcat-9.0.36-3.133.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.36-3.133.1.noarch as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:tomcat-admin-webapps-9.0.36-3.133.1.noarch" }, "product_reference": "tomcat-admin-webapps-9.0.36-3.133.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-docs-webapp-9.0.36-3.133.1.noarch as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:tomcat-docs-webapp-9.0.36-3.133.1.noarch" }, "product_reference": "tomcat-docs-webapp-9.0.36-3.133.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.36-3.133.1.noarch as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:tomcat-el-3_0-api-9.0.36-3.133.1.noarch" }, "product_reference": "tomcat-el-3_0-api-9.0.36-3.133.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-javadoc-9.0.36-3.133.1.noarch as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:tomcat-javadoc-9.0.36-3.133.1.noarch" }, "product_reference": "tomcat-javadoc-9.0.36-3.133.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.36-3.133.1.noarch as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:tomcat-jsp-2_3-api-9.0.36-3.133.1.noarch" }, "product_reference": "tomcat-jsp-2_3-api-9.0.36-3.133.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.36-3.133.1.noarch as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:tomcat-lib-9.0.36-3.133.1.noarch" }, "product_reference": "tomcat-lib-9.0.36-3.133.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.36-3.133.1.noarch as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:tomcat-servlet-4_0-api-9.0.36-3.133.1.noarch" }, "product_reference": "tomcat-servlet-4_0-api-9.0.36-3.133.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.36-3.133.1.noarch as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:tomcat-webapps-9.0.36-3.133.1.noarch" }, "product_reference": "tomcat-webapps-9.0.36-3.133.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-52316", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-52316" } ], "notes": [ { "category": "general", "text": "Unchecked Error Condition vulnerability in Apache Tomcat. If Tomcat is configured to use a custom Jakarta Authentication (formerly JASPIC) ServerAuthContext component which may throw an exception during the authentication process without explicitly setting an HTTP status to indicate failure, the authentication may not fail, allowing the user to bypass the authentication process. There are no known Jakarta Authentication components that behave in this way.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M26, from 10.1.0-M1 through 10.1.30, from 9.0.0-M1 through 9.0.95.\n\nThe following versions were EOL at the time the CVE was created but are \nknown to be affected: 8.5.0 though 8.5.100.\n\n\nUsers are recommended to upgrade to version 11.0.0, 10.1.31 or 9.0.96, which fix the issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5-LTSS:tomcat-9.0.36-3.133.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:tomcat-admin-webapps-9.0.36-3.133.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:tomcat-docs-webapp-9.0.36-3.133.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:tomcat-el-3_0-api-9.0.36-3.133.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:tomcat-javadoc-9.0.36-3.133.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:tomcat-jsp-2_3-api-9.0.36-3.133.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:tomcat-lib-9.0.36-3.133.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:tomcat-servlet-4_0-api-9.0.36-3.133.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:tomcat-webapps-9.0.36-3.133.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:tomcat-9.0.36-3.133.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:tomcat-admin-webapps-9.0.36-3.133.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:tomcat-docs-webapp-9.0.36-3.133.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:tomcat-el-3_0-api-9.0.36-3.133.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:tomcat-javadoc-9.0.36-3.133.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:tomcat-jsp-2_3-api-9.0.36-3.133.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:tomcat-lib-9.0.36-3.133.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:tomcat-servlet-4_0-api-9.0.36-3.133.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:tomcat-webapps-9.0.36-3.133.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-52316", "url": "https://www.suse.com/security/cve/CVE-2024-52316" }, { "category": "external", "summary": "SUSE Bug 1233434 for CVE-2024-52316", "url": "https://bugzilla.suse.com/1233434" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5-LTSS:tomcat-9.0.36-3.133.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:tomcat-admin-webapps-9.0.36-3.133.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:tomcat-docs-webapp-9.0.36-3.133.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:tomcat-el-3_0-api-9.0.36-3.133.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:tomcat-javadoc-9.0.36-3.133.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:tomcat-jsp-2_3-api-9.0.36-3.133.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:tomcat-lib-9.0.36-3.133.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:tomcat-servlet-4_0-api-9.0.36-3.133.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:tomcat-webapps-9.0.36-3.133.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:tomcat-9.0.36-3.133.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:tomcat-admin-webapps-9.0.36-3.133.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:tomcat-docs-webapp-9.0.36-3.133.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:tomcat-el-3_0-api-9.0.36-3.133.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:tomcat-javadoc-9.0.36-3.133.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:tomcat-jsp-2_3-api-9.0.36-3.133.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:tomcat-lib-9.0.36-3.133.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:tomcat-servlet-4_0-api-9.0.36-3.133.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:tomcat-webapps-9.0.36-3.133.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5-LTSS:tomcat-9.0.36-3.133.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:tomcat-admin-webapps-9.0.36-3.133.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:tomcat-docs-webapp-9.0.36-3.133.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:tomcat-el-3_0-api-9.0.36-3.133.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:tomcat-javadoc-9.0.36-3.133.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:tomcat-jsp-2_3-api-9.0.36-3.133.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:tomcat-lib-9.0.36-3.133.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:tomcat-servlet-4_0-api-9.0.36-3.133.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:tomcat-webapps-9.0.36-3.133.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:tomcat-9.0.36-3.133.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:tomcat-admin-webapps-9.0.36-3.133.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:tomcat-docs-webapp-9.0.36-3.133.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:tomcat-el-3_0-api-9.0.36-3.133.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:tomcat-javadoc-9.0.36-3.133.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:tomcat-jsp-2_3-api-9.0.36-3.133.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:tomcat-lib-9.0.36-3.133.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:tomcat-servlet-4_0-api-9.0.36-3.133.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:tomcat-webapps-9.0.36-3.133.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-11-27T08:34:49Z", "details": "critical" } ], "title": "CVE-2024-52316" } ] }
suse-su-2024:4106-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for tomcat", "title": "Title of the patch" }, { "category": "description", "text": "This update for tomcat fixes the following issues:\n\n- Update to Tomcat 9.0.97\n * Fixed CVEs:\n + CVE-2024-52316: If the Jakarta Authentication fails with an exception,\n set a 500 status (bsc#1233434)\n * Catalina\n + Add: Add support for the new Servlet API method \n HttpServletResponse.sendEarlyHints(). (markt)\n + Add: 55470: Add debug logging that reports the class path when a \n ClassNotFoundException occurs in the digester or the web application \n class loader. Based on a patch by Ralf Hauser. (markt)\n + Update: 69374: Properly separate between table header and body in \n DefaultServlet\u0027s listing. (michaelo)\n + Update: 69373: Make DefaultServlet\u0027s HTML listing file last modified \n rendering better (flexible). (michaelo)\n + Update: Improve HTML output of DefaultServlet. (michaelo)\n + Code: Refactor RateLimitFilter to use FilterBase as the base class. The \n primary advantage for doing this is less code to process init-param \n values. (markt)\n + Update: 69370: DefaultServlet\u0027s HTML listing uses incorrect labels. \n (michaelo)\n + Fix: Avoid NPE in CrawlerSessionManagerValve for partially mapped \n requests. (remm)\n + Fix: Add missing WebDAV Lock-Token header in the response when locking \n a folder. (remm)\n + Fix: Invalid WebDAV lock requests should be rejected with 400. (remm)\n + Fix: Fix regression in WebDAV when attempting to unlock a collection. \n (remm)\n + Fix: Verify that destination is not locked for a WebDAV copy operation. \n (remm)\n + Fix: Send 415 response to WebDAV MKCOL operations that include a \n request body since this is optional and unsupported. (remm)\n + Fix: Enforce DAV: namespace on WebDAV XML elements. (remm)\n + Fix: Do not allow a new WebDAV lock on a child resource if a parent \n collection is locked (RFC 4918 section 6.1). (remm)\n + Fix: WebDAV Delete should remove any existing lock on successfully \n deleted resources. (remm)\n + Update: Remove WebDAV lock null support in accordance with RFC 4918 \n section 7.3 and annex D. Instead, a lock on a non-existing resource \n will create an empty file locked with a regular lock. (remm)\n + Update: Rewrite implementation of WebDAV shared locks to comply with \n RFC 4918. (remm)\n + Update: Implement WebDAV If header using code from the Apache Jackrabbit \n project. (remm)\n + Add: Add PropertyStore interface in the WebDAV Servlet, to allow \n implementation of dead properties storage. The store used can be \n configured using the \u0027propertyStore\u0027 init parameter of the WebDAV \n servlet. A simple non-persistent implementation is used if no custom \n store is configured. (remm)\n + Update: Implement WebDAV PROPPATCH method using the newly added \n PropertyStore. (remm)\n + Fix: Cache not found results when searching for web application class \n loader resources. This addresses performance problems caused by \n components such as java.sql.DriverManager which, in some circumstances, \n will search for the same class repeatedly. In a large web application \n this can cause performance problems. The size of the cache can be \n controlled via the new notFoundClassResourceCacheSize on the \n StandardContext. (markt)\n + Fix: Stop after INITIALIZED state should be a noop since it is possible \n for subcomponents to be in FAILED after init. (remm)\n + Fix: Fix incorrect web resource cache size calculations when there are \n concurrent PUT and DELETE requests for the same resource. (markt)\n + Add: Add debug logging for the web resource cache so the current size \n can be tracked as resources are added and removed. (markt)\n + Update: Replace legacy WebDAV opaquelocktoken: scheme for lock tokens \n with urn:uuid: as recommended by RFC 4918, and remove secret init \n parameter. (remm)\n + Fix: Concurrent reads and writes (e.g. GET and PUT / DELETE) for the \n same path caused corruption of the FileResource where some of the \n fields were set as if the file exists and some as set as if it does \n not. This resulted in inconsistent metadata. (markt)\n + Fix: 69415: Ensure that the ExpiresFilter only sets cache headers on \n GET and HEAD requests. Also skip requests where the application has set \n Cache-Control: no-store. (markt)\n + Fix: 69419: Improve the performance of ServletRequest.getAttribute() \n when there are multiple levels of nested includes. Based on a patch \n provided by John Engebretson. (markt)\n + Add: All applications to send an early hints informational response by \n calling HttpServletResponse.sendError() with a status code of 103. \n (schultz)\n + Fix: Ensure that the Jakarta Authentication CallbackHandler only \n creates one GenericPrincipal in the Subject. (markt)\n + Fix: If the Jakarta Authentication process fails with an Exception, \n explicitly set the HTTP response status to 500 as the ServerAuthContext \n may not have set it. (markt)\n + Fix: When persisting the Jakarta Authentication provider configuration, \n create any necessary parent directories that don\u0027t already exist. \n (markt)\n + Fix: Correct the logic used to detect errors when deleting temporary \n files associated with persisting the Jakarta Authentication provider \n configuration. (markt)\n + Fix: When processing Jakarta Authentication callbacks, don\u0027t overwrite \n a Principal obtained from the PasswordValidationCallback with null if \n the CallerPrincipalCallback does not provide a Principal. (markt)\n + Fix: Avoid store config backup loss when storing one configuration more \n than once per second. (remm)\n + Fix: 69359: WebdavServlet duplicates getRelativePath() method from \n super class with incorrect Javadoc. (michaelo)\n + Fix: 69360: Inconsistent DELETE behavior between WebdavServlet and \n DefaultServlet. (michaelo)\n + Fix: Make WebdavServlet properly return the Allow header when deletion \n of a resource is not allowed. (michaelo)\n + Fix: Add log warning if non wildcard mappings are used with the \n WebdavServlet. (remm)\n + Fix: 69361: Ensure that the order of entries in a multi-status response \n to a WebDAV is consistent with the order in which resources were \n processed. (markt)\n + Fix: 69362: Provide a better multi-status response when deleting a \n collection via WebDAV fails. Empty directories that cannot be deleted \n will now be included in the response. (markt)\n + Fix: 69363: Use getPathPrefix() consistently in the WebDAV servlet to \n ensure that the correct path is used when the WebDAV servlet is mounted \n at a sub-path within the web application. (markt)\n + Fix: Improve performance of ApplicationHttpRequest.parseParameters(). \n Based on sample code and test cases provided by John Engebretson. \n (markt)\n + Add: Add support for RFC 8297 (Early Hints). Applications can use \n this feature by casting the HttpServletResponse to \n org.apache.catalina.connector.Reponse and then calling the method \n void sendEarlyHints(). This method will be added to the Servlet API \n (removing the need for the cast) in Servlet 6.2 onwards. (markt)\n + Fix: 69214: Do not reject a CORS request that uses POST but does not \n include a content-type header. Tomcat now correctly processes this as \n a simple CORS request. Based on a patch suggested by thebluemountain. \n (markt)\n + Fix: Refactor SpnegoAuthenticator so it uses Subject.callAs() rather \n than Subject.doAs() when available. (markt)\n * Coyote\n + Fix: Return null SSL session id on zero length byte array returned from \n the SSL implementation. (remm)\n + Fix: Skip OpenSSLConf with BoringSSL since it is unsupported. (remm)\n + Fix: Create the HttpParser in Http11Processor if it is not present on \n the AbstractHttp11Protocol to provide better lifecycle robustness for \n regular HTTP/1.1. The new behavior was introduced on a previous \n refactoring to improve HTTP/2 performance. (remm)\n + Fix: OpenSSLContext will now throw a KeyManagementException if something \n is known to have gone wrong in the init method, which is the behavior \n documented by javax.net.ssl.SSLContext.init. This makes error handling \n more consistent. (remm)\n + Fix: 69316: Ensure that FastHttpDateFormat#getCurrentDate() (used to \n generate Date headers for HTTP responses) generates the correct string \n for the given input. Prior to this change, the output may have been \n wrong by one second in some cases. Pull request #751 provided by Chenjp. \n (markt)\n + Add: Add server and serverRemoveAppProvidedValues to the list of \n attributes the HTTP/2 protocol will inherit from the HTTP/1.1 connector \n it is nested within. (markt)\n + Fix: Avoid possible crashes when using Apache Tomcat Native, caused by \n destroying SSLContext objects through GC after APR has been terminated. \n (remm)\n + Fix: Improve HTTP/2 handling of trailer fields for requests. Trailer \n fields no longer need to be received before the headers of the \n subsequent stream nor are trailer fields for an in-progress stream \n swallowed if the Connector is paused before the trailer fields are \n received. (markt)\n + Fix: Ensure the request and response are not recycled too soon for an \n HTTP/2 stream when a stream level error is detected during the processing \n of incoming HTTP/2 frames. This could lead to incorrect processing times \n appearing in the access log. (markt)\n + Fix: Fix 69320, a regression in the fix for 69302 that meant the \n HTTP/2 processing was likely to be broken for all clients once any \n client sent an HTTP/2 reset frame. (markt)\n + Fix: Correct a regression in the fix for non-blocking reads of chunked \n request bodies that caused InputStream.available() to return a non-zero \n value when there was no data to read. In some circumstances this could \n cause a blocking read to block waiting for more data rather than return \n the data it had already received. (markt)\n + Add: Add a new attribute cookiesWithoutEquals to the Rfc6265CookieProcessor. \n The default behaviour is unchanged. (markt)\n + Fix: Ensure that Tomcat sends a TLS close_notify message after receiving \n one from the client when using the OpenSSLImplementation. (markt)\n + Fix: 69301: Fix trailer headers replacing non-trailer headers when writing \n response headers to the access log. Based on a patch and test case \n provided by hypnoce. (markt)\n + Fix: 69302: If an HTTP/2 client resets a stream before the request body is \n fully written, ensure that any ReadListener is notified via a call to \n ReadListener.onErrror(). (markt)\n + Fix: Correct regressions in the refactoring that added recycling of the \n coyote request and response to the HTTP/2 processing. (markt)\n + Add: Add OpenSSL integration using the FFM API rather than Tomcat Native. \n OpenSSL support may be enabled by adding the \n org.apache.catalina.core.OpenSSLLifecycleListener listener on the \n Server element when using Java 22 or later. (remm)\n + Fix: Ensure that HTTP/2 stream input buffers are only created when there \n is a request body to be read. (markt)\n + Code: Refactor creation of HttpParser instances from the Processor level \n to the Protocol level since the parser configuration depends on the \n protocol and the parser is, otherwise, stateless. (markt)\n + Add: Align HTTP/2 with HTTP/1.1 and recycle the container internal \n request and response processing objects by default. This behaviour can \n be controlled via the new discardRequestsAndResponses attribute on the \n HTTP/2 upgrade protocol. (markt)\n * Jasper\n + Fix: Add back tag release method as deprecated in the runtime for \n compatibility with old generated code. (remm)\n + Fix: 69399: Fix regression caused by the improvement 69333 which caused \n the tag release to be called when using tag pooling, and to be skipped \n when not using it. Patch submitted by Michal Sobkiewicz. (remm)\n + Fix: 69381: Improve method lookup performance in expression language. \n When the required method has no arguments there is no need to consider \n casting or coercion and the method lookup process can be simplified. \n Based on pull request #770 by John Engebretson.\n + Fix: 69382: Improve the performance of the JSP include action by \n re-using results of relatively expensive method calls in the generated \n code rather than repeating them. Patch provided by John Engebretson. \n (markt)\n + Fix: 69398: Avoid unnecessary object allocation in PageContextImpl. \n Based on a suggestion by John Engebretson. (markt)\n + Fix: 69406: When using StringInterpreterEnum, do not throw an \n IllegalArgumentException when an invalid Enum is encountered. Instead, \n resolve the value at runtime. Patch provided by John Engebretson. \n (markt)\n + Fix: 69429: Optimise EL evaluation of method parameters for methods \n that do not accept any parameters. Patch provided by John Engebretson. \n (markt)\n + Fix: 69333: Remove unnecessary code from generated JSPs. (markt)\n + Fix: 69338: Improve the performance of processing expressions that \n include AND or OR operations with more than two operands and expressions \n that use not empty. (markt)\n + Fix: 69348: Reduce memory consumption in ELContext by using lazy \n initialization for the data structure used to track lambda arguments. \n (markt)\n + Fix: Switch the TldScanner back to logging detailed scan results at debug \n level rather than trace level. (markt)\n * Web applications\n + Fix: The manager webapp will now be able to access certificates again \n when OpenSSL is used. (remm)\n + Fix: Documentation. Align the logging configuration documentation with \n the current defaults. (markt)\n * WebSocket\n + Fix: If a blocking message write exceeds the timeout, don\u0027t attempt the \n write again before throwing the exception. (markt)\n + Fix: An EncodeException being thrown during a message write should not \n automatically cause the connection to close. The application should \n handle the exception and make the decision whether or not to close the \n connection. (markt)\n * jdbc-pool\n + Fix: 69255: Correct a regression in the fix for 69206 that meant exceptions \n executing statements were wrapped in a java.lang.reflect.UndeclaredThrowableException \n rather than the application seeing the original SQLException. Fixed by \n pull request #744 provided by Michael Clarke. (markt)\n + Fix: 69279: Correct a regression in the fix for 69206 that meant that \n methods that previously returned a null ResultSet were returning a proxy \n with a null delegate. Fixed by pull request #745 provided by Huub de Beer. \n (markt)\n + Fix: 69206: Ensure statements returned from Statement methods \n executeQuery(), getResultSet() and getGeneratedKeys() are correctly \n wrapped before being returned to the caller. Based on pull request \n #742 provided by Michael Clarke.\n * Other\n + Update: Switch from DigiCert ONE to ssl.com eSigner for code signing. \n (markt)\n + Update: Update Byte Buddy to 1.15.10. (markt)\n + Update: Update CheckStyle to 10.20.0. (markt)\n + Add: Improvements to German translations. (remm)\n + Add: Improvements to French translations. (remm)\n + Add: Improvements to Japanese translations by tak7iji. (markt)\n + Add: Improvements to Chinese translations by Ch_jp. (markt)\n + Add: Exclude the tomcat-coyote-ffm.jar from JAR scanning by default. \n (markt)\n + Fix: Change the default log handler level to ALL so log messages are \n not dropped by default if a logger is configured to use trace (FINEST) \n level logging. (markt)\n + Update: Update Hamcrest to 3.0. (markt)\n + Update: Update EasyMock to 5.4.0. (markt)\n + Update: Update Byte Buddy to 1.15.0. (markt)\n + Update: Update CheckStyle to 10.18.0. (markt)\n + Update: Update the internal fork of Apache Commons BCEL to 6.10.0. \n (markt)\n + Add: Improvements to Spanish translations by Fernando. (markt)\n + Add: Improvements to French translations. (remm)\n + Add: Improvements to Japanese translations by tak7iji. (markt)\n + Fix: Fix packaging regression with missing osgi information following \n addition of the test-only build target. (remm)\n + Update: Update Tomcat Native to 1.3.1. (markt)\n + Update: Update Byte Buddy to 1.14.18. (markt)\n + Add: Improvements to French translations. (remm)\n + Add: Improvements to Japanese translations by tak7iji. (markt)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2024-4106,SUSE-SLE-Module-Web-Scripting-15-SP5-2024-4106,SUSE-SLE-Module-Web-Scripting-15-SP6-2024-4106,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-4106,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-4106,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-4106,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-4106,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-4106,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-4106,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-4106,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-4106,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-4106,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-4106,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-4106,SUSE-Storage-7.1-2024-4106,openSUSE-SLE-15.5-2024-4106,openSUSE-SLE-15.6-2024-4106", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_4106-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2024:4106-1", "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20244106-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2024:4106-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019866.html" }, { "category": "self", "summary": "SUSE Bug 1233434", "url": "https://bugzilla.suse.com/1233434" }, { "category": "self", "summary": "SUSE CVE CVE-2024-52316 page", "url": "https://www.suse.com/security/cve/CVE-2024-52316/" } ], "title": "Security update for tomcat", "tracking": { "current_release_date": "2024-11-28T15:10:31Z", "generator": { "date": "2024-11-28T15:10:31Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2024:4106-1", "initial_release_date": "2024-11-28T15:10:31Z", "revision_history": [ { "date": "2024-11-28T15:10:31Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "tomcat-9.0.97-150200.71.1.noarch", "product": { "name": "tomcat-9.0.97-150200.71.1.noarch", "product_id": "tomcat-9.0.97-150200.71.1.noarch" } }, { "category": "product_version", "name": "tomcat-admin-webapps-9.0.97-150200.71.1.noarch", "product": { "name": "tomcat-admin-webapps-9.0.97-150200.71.1.noarch", "product_id": "tomcat-admin-webapps-9.0.97-150200.71.1.noarch" } }, { "category": "product_version", "name": "tomcat-docs-webapp-9.0.97-150200.71.1.noarch", "product": { "name": "tomcat-docs-webapp-9.0.97-150200.71.1.noarch", "product_id": "tomcat-docs-webapp-9.0.97-150200.71.1.noarch" } }, { "category": "product_version", "name": "tomcat-el-3_0-api-9.0.97-150200.71.1.noarch", "product": { "name": "tomcat-el-3_0-api-9.0.97-150200.71.1.noarch", "product_id": "tomcat-el-3_0-api-9.0.97-150200.71.1.noarch" } }, { "category": "product_version", "name": "tomcat-embed-9.0.97-150200.71.1.noarch", "product": { "name": "tomcat-embed-9.0.97-150200.71.1.noarch", "product_id": "tomcat-embed-9.0.97-150200.71.1.noarch" } }, { "category": "product_version", "name": "tomcat-javadoc-9.0.97-150200.71.1.noarch", "product": { "name": "tomcat-javadoc-9.0.97-150200.71.1.noarch", "product_id": "tomcat-javadoc-9.0.97-150200.71.1.noarch" } }, { "category": "product_version", "name": "tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch", "product": { "name": "tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch", "product_id": "tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch" } }, { "category": "product_version", "name": "tomcat-jsvc-9.0.97-150200.71.1.noarch", "product": { "name": "tomcat-jsvc-9.0.97-150200.71.1.noarch", "product_id": "tomcat-jsvc-9.0.97-150200.71.1.noarch" } }, { "category": "product_version", "name": "tomcat-lib-9.0.97-150200.71.1.noarch", "product": { "name": "tomcat-lib-9.0.97-150200.71.1.noarch", "product_id": "tomcat-lib-9.0.97-150200.71.1.noarch" } }, { "category": "product_version", "name": "tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch", "product": { "name": "tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch", "product_id": "tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch" } }, { "category": "product_version", "name": "tomcat-webapps-9.0.97-150200.71.1.noarch", "product": { "name": "tomcat-webapps-9.0.97-150200.71.1.noarch", "product_id": "tomcat-webapps-9.0.97-150200.71.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Web and Scripting 15 SP5", "product": { "name": "SUSE Linux Enterprise Module for Web and Scripting 15 SP5", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-web-scripting:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product": { "name": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-web-scripting:15:sp6" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp4" } } }, { "category": "product_name", "name": "SUSE Manager Server 4.3", "product": { "name": "SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-server:4.3" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 7.1", "product": { "name": "SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:7.1" } } }, { "category": "product_name", "name": "openSUSE Leap 15.5", "product": { "name": "openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.5" } } }, { "category": "product_name", "name": "openSUSE Leap 15.6", "product": { "name": "openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.6" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP5", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP5", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat-admin-webapps-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-admin-webapps-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP5", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat-el-3_0-api-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-el-3_0-api-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP5", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP5", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat-lib-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-lib-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP5", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP5", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat-webapps-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-webapps-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-admin-webapps-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-el-3_0-api-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-lib-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-webapps-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:tomcat-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:tomcat-admin-webapps-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-admin-webapps-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:tomcat-el-3_0-api-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-el-3_0-api-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:tomcat-lib-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-lib-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:tomcat-webapps-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-webapps-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-admin-webapps-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-el-3_0-api-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-lib-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-webapps-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-admin-webapps-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-el-3_0-api-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-lib-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-webapps-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-admin-webapps-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-el-3_0-api-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-lib-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-webapps-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:tomcat-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:tomcat-admin-webapps-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-admin-webapps-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:tomcat-el-3_0-api-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-el-3_0-api-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:tomcat-lib-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-lib-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:tomcat-webapps-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-webapps-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-admin-webapps-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-el-3_0-api-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-lib-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-webapps-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-admin-webapps-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-el-3_0-api-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-lib-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-webapps-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:tomcat-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:tomcat-admin-webapps-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-admin-webapps-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:tomcat-el-3_0-api-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-el-3_0-api-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:tomcat-lib-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-lib-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:tomcat-webapps-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-webapps-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-admin-webapps-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-el-3_0-api-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-lib-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-webapps-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-admin-webapps-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-el-3_0-api-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-lib-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.97-150200.71.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-webapps-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.97-150200.71.1.noarch as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:tomcat-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.97-150200.71.1.noarch as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-admin-webapps-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.97-150200.71.1.noarch as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-el-3_0-api-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.97-150200.71.1.noarch as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:tomcat-lib-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-lib-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.97-150200.71.1.noarch as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:tomcat-webapps-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-webapps-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.97-150200.71.1.noarch as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:tomcat-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.97-150200.71.1.noarch as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-admin-webapps-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.97-150200.71.1.noarch as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-el-3_0-api-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.97-150200.71.1.noarch as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-lib-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.97-150200.71.1.noarch as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-webapps-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.97-150200.71.1.noarch as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:tomcat-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.97-150200.71.1.noarch as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:tomcat-admin-webapps-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-admin-webapps-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-docs-webapp-9.0.97-150200.71.1.noarch as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:tomcat-docs-webapp-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-docs-webapp-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.97-150200.71.1.noarch as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:tomcat-el-3_0-api-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-el-3_0-api-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-embed-9.0.97-150200.71.1.noarch as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:tomcat-embed-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-embed-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-javadoc-9.0.97-150200.71.1.noarch as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:tomcat-javadoc-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-javadoc-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsvc-9.0.97-150200.71.1.noarch as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:tomcat-jsvc-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-jsvc-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.97-150200.71.1.noarch as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:tomcat-lib-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-lib-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.97-150200.71.1.noarch as component of openSUSE Leap 15.5", "product_id": "openSUSE Leap 15.5:tomcat-webapps-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-webapps-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.5" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.97-150200.71.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.97-150200.71.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-admin-webapps-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-docs-webapp-9.0.97-150200.71.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-docs-webapp-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.97-150200.71.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-el-3_0-api-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-embed-9.0.97-150200.71.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat-embed-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-embed-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-javadoc-9.0.97-150200.71.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat-javadoc-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-javadoc-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsvc-9.0.97-150200.71.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat-jsvc-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-jsvc-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.97-150200.71.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat-lib-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-lib-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.97-150200.71.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:tomcat-webapps-9.0.97-150200.71.1.noarch" }, "product_reference": "tomcat-webapps-9.0.97-150200.71.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-52316", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-52316" } ], "notes": [ { "category": "general", "text": "Unchecked Error Condition vulnerability in Apache Tomcat. If Tomcat is configured to use a custom Jakarta Authentication (formerly JASPIC) ServerAuthContext component which may throw an exception during the authentication process without explicitly setting an HTTP status to indicate failure, the authentication may not fail, allowing the user to bypass the authentication process. There are no known Jakarta Authentication components that behave in this way.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M26, from 10.1.0-M1 through 10.1.30, from 9.0.0-M1 through 9.0.95.\n\nThe following versions were EOL at the time the CVE was created but are \nknown to be affected: 8.5.0 though 8.5.100.\n\n\nUsers are recommended to upgrade to version 11.0.0, 10.1.31 or 9.0.96, which fix the issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:tomcat-9.0.97-150200.71.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.97-150200.71.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.97-150200.71.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.97-150200.71.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:tomcat-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:tomcat-admin-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:tomcat-el-3_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:tomcat-lib-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:tomcat-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat-admin-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat-el-3_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat-lib-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:tomcat-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:tomcat-admin-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:tomcat-el-3_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:tomcat-lib-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:tomcat-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:tomcat-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:tomcat-admin-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:tomcat-el-3_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:tomcat-lib-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:tomcat-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.97-150200.71.1.noarch", "SUSE Manager Server 4.3:tomcat-9.0.97-150200.71.1.noarch", "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.97-150200.71.1.noarch", "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.97-150200.71.1.noarch", "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch", "SUSE Manager Server 4.3:tomcat-lib-9.0.97-150200.71.1.noarch", "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch", "SUSE Manager Server 4.3:tomcat-webapps-9.0.97-150200.71.1.noarch", "openSUSE Leap 15.5:tomcat-9.0.97-150200.71.1.noarch", "openSUSE Leap 15.5:tomcat-admin-webapps-9.0.97-150200.71.1.noarch", "openSUSE Leap 15.5:tomcat-docs-webapp-9.0.97-150200.71.1.noarch", "openSUSE Leap 15.5:tomcat-el-3_0-api-9.0.97-150200.71.1.noarch", "openSUSE Leap 15.5:tomcat-embed-9.0.97-150200.71.1.noarch", "openSUSE Leap 15.5:tomcat-javadoc-9.0.97-150200.71.1.noarch", "openSUSE Leap 15.5:tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch", "openSUSE Leap 15.5:tomcat-jsvc-9.0.97-150200.71.1.noarch", "openSUSE Leap 15.5:tomcat-lib-9.0.97-150200.71.1.noarch", "openSUSE Leap 15.5:tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch", "openSUSE Leap 15.5:tomcat-webapps-9.0.97-150200.71.1.noarch", "openSUSE Leap 15.6:tomcat-9.0.97-150200.71.1.noarch", "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.97-150200.71.1.noarch", "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.97-150200.71.1.noarch", "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.97-150200.71.1.noarch", "openSUSE Leap 15.6:tomcat-embed-9.0.97-150200.71.1.noarch", "openSUSE Leap 15.6:tomcat-javadoc-9.0.97-150200.71.1.noarch", "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch", "openSUSE Leap 15.6:tomcat-jsvc-9.0.97-150200.71.1.noarch", "openSUSE Leap 15.6:tomcat-lib-9.0.97-150200.71.1.noarch", "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch", "openSUSE Leap 15.6:tomcat-webapps-9.0.97-150200.71.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2024-52316", "url": "https://www.suse.com/security/cve/CVE-2024-52316" }, { "category": "external", "summary": "SUSE Bug 1233434 for CVE-2024-52316", "url": "https://bugzilla.suse.com/1233434" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:tomcat-9.0.97-150200.71.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.97-150200.71.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.97-150200.71.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.97-150200.71.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:tomcat-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:tomcat-admin-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:tomcat-el-3_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:tomcat-lib-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:tomcat-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat-admin-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat-el-3_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat-lib-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:tomcat-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:tomcat-admin-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:tomcat-el-3_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:tomcat-lib-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:tomcat-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:tomcat-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:tomcat-admin-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:tomcat-el-3_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:tomcat-lib-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:tomcat-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.97-150200.71.1.noarch", "SUSE Manager Server 4.3:tomcat-9.0.97-150200.71.1.noarch", "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.97-150200.71.1.noarch", "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.97-150200.71.1.noarch", "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch", "SUSE Manager Server 4.3:tomcat-lib-9.0.97-150200.71.1.noarch", "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch", "SUSE Manager Server 4.3:tomcat-webapps-9.0.97-150200.71.1.noarch", "openSUSE Leap 15.5:tomcat-9.0.97-150200.71.1.noarch", "openSUSE Leap 15.5:tomcat-admin-webapps-9.0.97-150200.71.1.noarch", "openSUSE Leap 15.5:tomcat-docs-webapp-9.0.97-150200.71.1.noarch", "openSUSE Leap 15.5:tomcat-el-3_0-api-9.0.97-150200.71.1.noarch", "openSUSE Leap 15.5:tomcat-embed-9.0.97-150200.71.1.noarch", "openSUSE Leap 15.5:tomcat-javadoc-9.0.97-150200.71.1.noarch", "openSUSE Leap 15.5:tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch", "openSUSE Leap 15.5:tomcat-jsvc-9.0.97-150200.71.1.noarch", "openSUSE Leap 15.5:tomcat-lib-9.0.97-150200.71.1.noarch", "openSUSE Leap 15.5:tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch", "openSUSE Leap 15.5:tomcat-webapps-9.0.97-150200.71.1.noarch", "openSUSE Leap 15.6:tomcat-9.0.97-150200.71.1.noarch", "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.97-150200.71.1.noarch", "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.97-150200.71.1.noarch", "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.97-150200.71.1.noarch", "openSUSE Leap 15.6:tomcat-embed-9.0.97-150200.71.1.noarch", "openSUSE Leap 15.6:tomcat-javadoc-9.0.97-150200.71.1.noarch", "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch", "openSUSE Leap 15.6:tomcat-jsvc-9.0.97-150200.71.1.noarch", "openSUSE Leap 15.6:tomcat-lib-9.0.97-150200.71.1.noarch", "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch", "openSUSE Leap 15.6:tomcat-webapps-9.0.97-150200.71.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:tomcat-9.0.97-150200.71.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.97-150200.71.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.97-150200.71.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.97-150200.71.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:tomcat-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:tomcat-admin-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:tomcat-el-3_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:tomcat-lib-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:tomcat-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat-admin-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat-el-3_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat-lib-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:tomcat-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:tomcat-admin-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:tomcat-el-3_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:tomcat-lib-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server 15 SP2-LTSS:tomcat-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:tomcat-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:tomcat-admin-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:tomcat-el-3_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:tomcat-lib-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP2:tomcat-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.97-150200.71.1.noarch", "SUSE Manager Server 4.3:tomcat-9.0.97-150200.71.1.noarch", "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.97-150200.71.1.noarch", "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.97-150200.71.1.noarch", "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch", "SUSE Manager Server 4.3:tomcat-lib-9.0.97-150200.71.1.noarch", "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch", "SUSE Manager Server 4.3:tomcat-webapps-9.0.97-150200.71.1.noarch", "openSUSE Leap 15.5:tomcat-9.0.97-150200.71.1.noarch", "openSUSE Leap 15.5:tomcat-admin-webapps-9.0.97-150200.71.1.noarch", "openSUSE Leap 15.5:tomcat-docs-webapp-9.0.97-150200.71.1.noarch", "openSUSE Leap 15.5:tomcat-el-3_0-api-9.0.97-150200.71.1.noarch", "openSUSE Leap 15.5:tomcat-embed-9.0.97-150200.71.1.noarch", "openSUSE Leap 15.5:tomcat-javadoc-9.0.97-150200.71.1.noarch", "openSUSE Leap 15.5:tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch", "openSUSE Leap 15.5:tomcat-jsvc-9.0.97-150200.71.1.noarch", "openSUSE Leap 15.5:tomcat-lib-9.0.97-150200.71.1.noarch", "openSUSE Leap 15.5:tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch", "openSUSE Leap 15.5:tomcat-webapps-9.0.97-150200.71.1.noarch", "openSUSE Leap 15.6:tomcat-9.0.97-150200.71.1.noarch", "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.97-150200.71.1.noarch", "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.97-150200.71.1.noarch", "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.97-150200.71.1.noarch", "openSUSE Leap 15.6:tomcat-embed-9.0.97-150200.71.1.noarch", "openSUSE Leap 15.6:tomcat-javadoc-9.0.97-150200.71.1.noarch", "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.97-150200.71.1.noarch", "openSUSE Leap 15.6:tomcat-jsvc-9.0.97-150200.71.1.noarch", "openSUSE Leap 15.6:tomcat-lib-9.0.97-150200.71.1.noarch", "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.97-150200.71.1.noarch", "openSUSE Leap 15.6:tomcat-webapps-9.0.97-150200.71.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2024-11-28T15:10:31Z", "details": "critical" } ], "title": "CVE-2024-52316" } ] }
rhsa-2025:3609
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat JBoss Web Server 6.1.0 zip release is now available for Red Hat Enterprise Linux 8, Red Hat Enterprise Linux 9, and Windows Server.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache Tomcat Servlet container, JBoss HTTP Connector (mod_cluster), the PicketLink Vault extension for Apache Tomcat, and the Tomcat Native library.\n\nThis release of Red Hat JBoss Web Server 6.1.0 serves as a replacement for Red Hat JBoss Web Server 6.0.5. This release includes bug fixes, enhancements and component upgrades, which are documented in the Release Notes that are linked to in the References section.\n\nSecurity Fix(es):\n\n* org.apache.tomcat/tomcat: Apache Tomcat: Authentication bypass when using Jakarta Authentication API [jws-6] (CVE-2024-52316)\n* tomcat: Potential RCE and/or information disclosure and/or information corruption with partial PUT [jws-6] (CVE-2025-24813)\n* tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame [jws-6] (CVE-2025-31650)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:3609", "url": "https://access.redhat.com/errata/RHSA-2025:3609" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_web_server/6.1/html/red_hat_jboss_web_server_6.1_release_notes/index", "url": "https://docs.redhat.com/en/documentation/red_hat_jboss_web_server/6.1/html/red_hat_jboss_web_server_6.1_release_notes/index" }, { "category": "external", "summary": "2326972", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2326972" }, { "category": "external", "summary": "2351129", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2351129" }, { "category": "external", "summary": "2362783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2362783" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_3609.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Web Server 6.1.0 release and security update", "tracking": { "current_release_date": "2025-08-03T13:24:29+00:00", "generator": { "date": "2025-08-03T13:24:29+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2025:3609", "initial_release_date": "2025-04-07T17:01:23+00:00", "revision_history": [ { "date": "2025-04-07T17:01:23+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-05-19T10:12:45+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-03T13:24:29+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Web Server 6", "product": { "name": "Red Hat JBoss Web Server 6", "product_id": "Red Hat JBoss Web Server 6", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:6.1" } } } ], "category": "product_family", "name": "Red Hat JBoss Web Server" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-52316", "cwe": { "id": "CWE-248", "name": "Uncaught Exception" }, "discovery_date": "2024-11-18T12:00:54.223330+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2326972" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache Tomcat when configured to use a custom Jakarta Authentication (formerly JASPIC) ServerAuthContext component. This vulnerability allows authentication bypass via improperly handled exceptions during the authentication process.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Apache Tomcat: Authentication bypass when using Jakarta Authentication API", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security has assessed this flaw at Attack Complexity as High, and impact metrics Confidentiality and Integrity as High, with a resultant base flaw Security Impact of Important. However, the factors involved in successful exploitation--usage of a custom Jakarta ServerAuthContext component, possible mishandling of exception management in that custom component, and failure in such a way as to allow a failed authentication to proceed in that exception mishandling--are sufficiently unlikely, such that Apache determined the impact to be Low. While Red Hat concurs with the worst-case assessment of Important for the base flaw, all products are assessed as Low, per individual risk assessment and in concurrence with Apache\u0027s rating.\n\nRed Hat Satellite is not directly impacted by this issue as it does not include the affected Tomcat package. However, Tomcat is consumed by Candlepin, a component of Satellite. Red Hat Satellite users are advised to check the impact state of Red Hat Enterprise Linux as any necessary fixes will be distributed through the platform.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 6" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-52316" }, { "category": "external", "summary": "RHBZ#2326972", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2326972" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-52316", "url": "https://www.cve.org/CVERecord?id=CVE-2024-52316" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-52316", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-52316" }, { "category": "external", "summary": "https://lists.apache.org/thread/lopzlqh91jj9n334g02om08sbysdb928", "url": "https://lists.apache.org/thread/lopzlqh91jj9n334g02om08sbysdb928" } ], "release_date": "2024-11-18T11:32:22.072000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-04-07T17:01:23+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation, including all applications and configuration files.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Web Server 6" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:3609" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat JBoss Web Server 6" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "tomcat: Apache Tomcat: Authentication bypass when using Jakarta Authentication API" }, { "cve": "CVE-2025-24813", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2025-03-10T17:00:47.696071+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2351129" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache Tomcat. In certain conditions and configurations, this vulnerability allows a remote attacker to exploit a path equivalence flaw to view file system contents and add malicious content via a write-enabled\u00a0Default Servlet\u00a0in Apache Tomcat. \n\nFor the vulnerability to be exploited, the following conditions must be true: writes to the default servlet are enabled (disabled by default), sensitive file uploads are sub-directories of a target URL for public uploads, attackers know the names of the files, and those files are subject to partial PUT uploads enabled by default. If an application uses file-based session persistence with default storage and includes exploitable libraries, remote code execution (RCE) is possible.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Potential RCE and/or information disclosure and/or information corruption with partial PUT", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability has a Moderate impact (rather than Important) because it requires multiple non-default configurations to be exploitable, significantly limiting its impact in typical deployments. For remote code execution (RCE), exploitation requires both file-based session persistence and a library vulnerable to deserialization, further reducing its likelihood. For information disclosure or file injection, the attack is only possible if writes are enabled for the default servlet, partial PUT requests are supported, and sensitive file uploads occur within a publicly writable directory. The combination of all three of these conditions is uncommon in secure environments. Since most modern Tomcat deployments do not meet all these criteria simultaneously, the overall risk is reduced\n\nThe Tomcat package as shipped in Red Hat Enterprise Linux 6 and 7 is not affected by this vulnerability because the vulnerable code was introduced in a newer Tomcat version.\n\nRed Hat Satellite is not directly impacted by this issue as it does not include the affected Tomcat package. However, Tomcat is consumed by Candlepin, a component of Satellite. Red Hat Satellite users are advised to check the impact state of Red Hat Enterprise Linux as any necessary fixes will be distributed through the platform. Satellite configuration does not contain affected parameters that would make Tomcat vulnerable, therefore, even if a vulnerable Tomcat version is shipped with affected RHEL release alongside Satellite, there is no chance of it being exposed to flaw in Red Hat Satellite.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 6" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24813" }, { "category": "external", "summary": "RHBZ#2351129", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2351129" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24813", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24813" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24813", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24813" }, { "category": "external", "summary": "https://lists.apache.org/thread/j5fkjv2k477os90nczf2v9l61fb0kkgq", "url": "https://lists.apache.org/thread/j5fkjv2k477os90nczf2v9l61fb0kkgq" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2025-03-10T16:44:03.715000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-04-07T17:01:23+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation, including all applications and configuration files.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Web Server 6" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:3609" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "Red Hat JBoss Web Server 6" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "products": [ "Red Hat JBoss Web Server 6" ] } ], "threats": [ { "category": "exploit_status", "date": "2025-04-01T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "tomcat: Potential RCE and/or information disclosure and/or information corruption with partial PUT" }, { "cve": "CVE-2025-31650", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2025-04-28T20:00:59.032884+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2362783" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache Tomcat. This vulnerability allows an application-level denial of service (DoS), causing it to become unresponsive or slow via maliciously crafted HTTP/2 prioritization headers. It performs an incomplete cleanup of failed requests, which triggers a memory leak.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame", "title": "Vulnerability summary" }, { "category": "other", "text": "This is marked as Important vulnerability rather than a Moderate flaw because it introduces a reliable, unauthenticated denial-of-service (DoS) vector that exploits the core request-handling mechanism in Apache Tomcat. Specifically, the improper handling of invalid HTTP/2 Priority headers results in incomplete memory deallocation, creating a server-side memory leak. Unlike transient request errors that are gracefully handled and discarded, these malformed requests accumulate residual memory allocations over time. \n\nThis means an attacker can trigger an OutOfMemoryException simply by sending a large volume of crafted HTTP/2 requests, effectively rendering the server non-functional without needing authentication or access to specific endpoints. Given that HTTP/2 is widely used in production environments to improve performance, this vulnerability targets a default, high-traffic pathway, making it more impactful.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 6" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-31650" }, { "category": "external", "summary": "RHBZ#2362783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2362783" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-31650", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31650" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31650", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31650" }, { "category": "external", "summary": "https://lists.apache.org/thread/j6zzk0y3yym9pzfzkq5vcyxzz0yzh826", "url": "https://lists.apache.org/thread/j6zzk0y3yym9pzfzkq5vcyxzz0yzh826" } ], "release_date": "2025-04-28T19:14:31.107000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-04-07T17:01:23+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation, including all applications and configuration files.\n\nThe References section of this erratum contains a download link for the update. You must be logged in to download the update.", "product_ids": [ "Red Hat JBoss Web Server 6" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:3609" }, { "category": "workaround", "details": "Mitigation is either unavailable or does not meet Red Hat Product Security standards for usability, deployment, applicability, or stability.", "product_ids": [ "Red Hat JBoss Web Server 6" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Web Server 6" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame" } ] }
rhsa-2025:7497
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for tomcat is now available for Red Hat Enterprise Linux 10.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies.\n\nSecurity Fix(es):\n\n* tomcat: Apache Tomcat: Authentication bypass when using Jakarta Authentication API (CVE-2024-52316)\n\n* tomcat: Apache Tomcat: DoS in examples web application (CVE-2024-54677)\n\n* tomcat: Potential RCE and/or information disclosure and/or information corruption with partial PUT (CVE-2025-24813)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:7497", "url": "https://access.redhat.com/errata/RHSA-2025:7497" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2326972", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2326972" }, { "category": "external", "summary": "2332815", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2332815" }, { "category": "external", "summary": "2351129", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2351129" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_7497.json" } ], "title": "Red Hat Security Advisory: tomcat security update", "tracking": { "current_release_date": "2025-08-03T13:23:35+00:00", "generator": { "date": "2025-08-03T13:23:35+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2025:7497", "initial_release_date": "2025-05-13T16:02:30+00:00", "revision_history": [ { "date": "2025-05-13T16:02:30+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-05-13T16:02:30+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-03T13:23:35+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 10)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:10.0" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "tomcat-1:10.1.36-1.el10_0.src", "product": { "name": "tomcat-1:10.1.36-1.el10_0.src", "product_id": "tomcat-1:10.1.36-1.el10_0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat@10.1.36-1.el10_0?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "tomcat-1:10.1.36-1.el10_0.noarch", "product": { "name": "tomcat-1:10.1.36-1.el10_0.noarch", "product_id": "tomcat-1:10.1.36-1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat@10.1.36-1.el10_0?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-admin-webapps-1:10.1.36-1.el10_0.noarch", "product": { "name": "tomcat-admin-webapps-1:10.1.36-1.el10_0.noarch", "product_id": "tomcat-admin-webapps-1:10.1.36-1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-admin-webapps@10.1.36-1.el10_0?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-docs-webapp-1:10.1.36-1.el10_0.noarch", "product": { "name": "tomcat-docs-webapp-1:10.1.36-1.el10_0.noarch", "product_id": "tomcat-docs-webapp-1:10.1.36-1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-docs-webapp@10.1.36-1.el10_0?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-el-5.0-api-1:10.1.36-1.el10_0.noarch", "product": { "name": "tomcat-el-5.0-api-1:10.1.36-1.el10_0.noarch", "product_id": "tomcat-el-5.0-api-1:10.1.36-1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-el-5.0-api@10.1.36-1.el10_0?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-jsp-3.1-api-1:10.1.36-1.el10_0.noarch", "product": { "name": "tomcat-jsp-3.1-api-1:10.1.36-1.el10_0.noarch", "product_id": "tomcat-jsp-3.1-api-1:10.1.36-1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-jsp-3.1-api@10.1.36-1.el10_0?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-lib-1:10.1.36-1.el10_0.noarch", "product": { "name": "tomcat-lib-1:10.1.36-1.el10_0.noarch", "product_id": "tomcat-lib-1:10.1.36-1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-lib@10.1.36-1.el10_0?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-servlet-6.0-api-1:10.1.36-1.el10_0.noarch", "product": { "name": "tomcat-servlet-6.0-api-1:10.1.36-1.el10_0.noarch", "product_id": "tomcat-servlet-6.0-api-1:10.1.36-1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-servlet-6.0-api@10.1.36-1.el10_0?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat-webapps-1:10.1.36-1.el10_0.noarch", "product": { "name": "tomcat-webapps-1:10.1.36-1.el10_0.noarch", "product_id": "tomcat-webapps-1:10.1.36-1.el10_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-webapps@10.1.36-1.el10_0?arch=noarch\u0026epoch=1" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tomcat-1:10.1.36-1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:tomcat-1:10.1.36-1.el10_0.noarch" }, "product_reference": "tomcat-1:10.1.36-1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-1:10.1.36-1.el10_0.src as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:tomcat-1:10.1.36-1.el10_0.src" }, "product_reference": "tomcat-1:10.1.36-1.el10_0.src", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-1:10.1.36-1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:tomcat-admin-webapps-1:10.1.36-1.el10_0.noarch" }, "product_reference": "tomcat-admin-webapps-1:10.1.36-1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-docs-webapp-1:10.1.36-1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:tomcat-docs-webapp-1:10.1.36-1.el10_0.noarch" }, "product_reference": "tomcat-docs-webapp-1:10.1.36-1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-5.0-api-1:10.1.36-1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:tomcat-el-5.0-api-1:10.1.36-1.el10_0.noarch" }, "product_reference": "tomcat-el-5.0-api-1:10.1.36-1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-3.1-api-1:10.1.36-1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:tomcat-jsp-3.1-api-1:10.1.36-1.el10_0.noarch" }, "product_reference": "tomcat-jsp-3.1-api-1:10.1.36-1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-1:10.1.36-1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:tomcat-lib-1:10.1.36-1.el10_0.noarch" }, "product_reference": "tomcat-lib-1:10.1.36-1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-6.0-api-1:10.1.36-1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:tomcat-servlet-6.0-api-1:10.1.36-1.el10_0.noarch" }, "product_reference": "tomcat-servlet-6.0-api-1:10.1.36-1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-1:10.1.36-1.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)", "product_id": "AppStream-10.0.Z:tomcat-webapps-1:10.1.36-1.el10_0.noarch" }, "product_reference": "tomcat-webapps-1:10.1.36-1.el10_0.noarch", "relates_to_product_reference": "AppStream-10.0.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-52316", "cwe": { "id": "CWE-248", "name": "Uncaught Exception" }, "discovery_date": "2024-11-18T12:00:54.223330+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2326972" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache Tomcat when configured to use a custom Jakarta Authentication (formerly JASPIC) ServerAuthContext component. This vulnerability allows authentication bypass via improperly handled exceptions during the authentication process.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Apache Tomcat: Authentication bypass when using Jakarta Authentication API", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security has assessed this flaw at Attack Complexity as High, and impact metrics Confidentiality and Integrity as High, with a resultant base flaw Security Impact of Important. However, the factors involved in successful exploitation--usage of a custom Jakarta ServerAuthContext component, possible mishandling of exception management in that custom component, and failure in such a way as to allow a failed authentication to proceed in that exception mishandling--are sufficiently unlikely, such that Apache determined the impact to be Low. While Red Hat concurs with the worst-case assessment of Important for the base flaw, all products are assessed as Low, per individual risk assessment and in concurrence with Apache\u0027s rating.\n\nRed Hat Satellite is not directly impacted by this issue as it does not include the affected Tomcat package. However, Tomcat is consumed by Candlepin, a component of Satellite. Red Hat Satellite users are advised to check the impact state of Red Hat Enterprise Linux as any necessary fixes will be distributed through the platform.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-10.0.Z:tomcat-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-1:10.1.36-1.el10_0.src", "AppStream-10.0.Z:tomcat-admin-webapps-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-docs-webapp-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-el-5.0-api-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-jsp-3.1-api-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-lib-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-servlet-6.0-api-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-webapps-1:10.1.36-1.el10_0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-52316" }, { "category": "external", "summary": "RHBZ#2326972", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2326972" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-52316", "url": "https://www.cve.org/CVERecord?id=CVE-2024-52316" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-52316", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-52316" }, { "category": "external", "summary": "https://lists.apache.org/thread/lopzlqh91jj9n334g02om08sbysdb928", "url": "https://lists.apache.org/thread/lopzlqh91jj9n334g02om08sbysdb928" } ], "release_date": "2024-11-18T11:32:22.072000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-05-13T16:02:30+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-10.0.Z:tomcat-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-1:10.1.36-1.el10_0.src", "AppStream-10.0.Z:tomcat-admin-webapps-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-docs-webapp-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-el-5.0-api-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-jsp-3.1-api-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-lib-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-servlet-6.0-api-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-webapps-1:10.1.36-1.el10_0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:7497" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-10.0.Z:tomcat-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-1:10.1.36-1.el10_0.src", "AppStream-10.0.Z:tomcat-admin-webapps-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-docs-webapp-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-el-5.0-api-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-jsp-3.1-api-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-lib-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-servlet-6.0-api-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-webapps-1:10.1.36-1.el10_0.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "tomcat: Apache Tomcat: Authentication bypass when using Jakarta Authentication API" }, { "cve": "CVE-2024-54677", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2024-12-17T13:00:41.984822+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2332815" } ], "notes": [ { "category": "description", "text": "A flaw was found in the \"examples\" web application of Apache Tomcat. Numerous examples within that application did not place limits on uploaded data. This vulnerability can potentially trigger an out-of-memory (OOM) error, leading to a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Apache Tomcat: DoS in examples web application", "title": "Vulnerability summary" }, { "category": "other", "text": "By default, the examples web application is only accessible to the localhost.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-10.0.Z:tomcat-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-1:10.1.36-1.el10_0.src", "AppStream-10.0.Z:tomcat-admin-webapps-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-docs-webapp-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-el-5.0-api-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-jsp-3.1-api-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-lib-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-servlet-6.0-api-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-webapps-1:10.1.36-1.el10_0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-54677" }, { "category": "external", "summary": "RHBZ#2332815", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2332815" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-54677", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54677" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54677", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54677" }, { "category": "external", "summary": "https://lists.apache.org/thread/tdtbbxpg5trdwc2wnopcth9ccvdftq2n", "url": "https://lists.apache.org/thread/tdtbbxpg5trdwc2wnopcth9ccvdftq2n" } ], "release_date": "2024-12-17T12:35:50.948000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-05-13T16:02:30+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-10.0.Z:tomcat-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-1:10.1.36-1.el10_0.src", "AppStream-10.0.Z:tomcat-admin-webapps-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-docs-webapp-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-el-5.0-api-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-jsp-3.1-api-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-lib-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-servlet-6.0-api-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-webapps-1:10.1.36-1.el10_0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:7497" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "AppStream-10.0.Z:tomcat-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-1:10.1.36-1.el10_0.src", "AppStream-10.0.Z:tomcat-admin-webapps-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-docs-webapp-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-el-5.0-api-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-jsp-3.1-api-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-lib-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-servlet-6.0-api-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-webapps-1:10.1.36-1.el10_0.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "tomcat: Apache Tomcat: DoS in examples web application" }, { "cve": "CVE-2025-24813", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2025-03-10T17:00:47.696071+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2351129" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache Tomcat. In certain conditions and configurations, this vulnerability allows a remote attacker to exploit a path equivalence flaw to view file system contents and add malicious content via a write-enabled\u00a0Default Servlet\u00a0in Apache Tomcat. \n\nFor the vulnerability to be exploited, the following conditions must be true: writes to the default servlet are enabled (disabled by default), sensitive file uploads are sub-directories of a target URL for public uploads, attackers know the names of the files, and those files are subject to partial PUT uploads enabled by default. If an application uses file-based session persistence with default storage and includes exploitable libraries, remote code execution (RCE) is possible.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Potential RCE and/or information disclosure and/or information corruption with partial PUT", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability has a Moderate impact (rather than Important) because it requires multiple non-default configurations to be exploitable, significantly limiting its impact in typical deployments. For remote code execution (RCE), exploitation requires both file-based session persistence and a library vulnerable to deserialization, further reducing its likelihood. For information disclosure or file injection, the attack is only possible if writes are enabled for the default servlet, partial PUT requests are supported, and sensitive file uploads occur within a publicly writable directory. The combination of all three of these conditions is uncommon in secure environments. Since most modern Tomcat deployments do not meet all these criteria simultaneously, the overall risk is reduced\n\nThe Tomcat package as shipped in Red Hat Enterprise Linux 6 and 7 is not affected by this vulnerability because the vulnerable code was introduced in a newer Tomcat version.\n\nRed Hat Satellite is not directly impacted by this issue as it does not include the affected Tomcat package. However, Tomcat is consumed by Candlepin, a component of Satellite. Red Hat Satellite users are advised to check the impact state of Red Hat Enterprise Linux as any necessary fixes will be distributed through the platform. Satellite configuration does not contain affected parameters that would make Tomcat vulnerable, therefore, even if a vulnerable Tomcat version is shipped with affected RHEL release alongside Satellite, there is no chance of it being exposed to flaw in Red Hat Satellite.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-10.0.Z:tomcat-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-1:10.1.36-1.el10_0.src", "AppStream-10.0.Z:tomcat-admin-webapps-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-docs-webapp-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-el-5.0-api-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-jsp-3.1-api-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-lib-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-servlet-6.0-api-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-webapps-1:10.1.36-1.el10_0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24813" }, { "category": "external", "summary": "RHBZ#2351129", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2351129" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24813", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24813" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24813", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24813" }, { "category": "external", "summary": "https://lists.apache.org/thread/j5fkjv2k477os90nczf2v9l61fb0kkgq", "url": "https://lists.apache.org/thread/j5fkjv2k477os90nczf2v9l61fb0kkgq" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2025-03-10T16:44:03.715000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-05-13T16:02:30+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-10.0.Z:tomcat-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-1:10.1.36-1.el10_0.src", "AppStream-10.0.Z:tomcat-admin-webapps-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-docs-webapp-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-el-5.0-api-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-jsp-3.1-api-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-lib-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-servlet-6.0-api-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-webapps-1:10.1.36-1.el10_0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:7497" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-10.0.Z:tomcat-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-1:10.1.36-1.el10_0.src", "AppStream-10.0.Z:tomcat-admin-webapps-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-docs-webapp-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-el-5.0-api-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-jsp-3.1-api-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-lib-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-servlet-6.0-api-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-webapps-1:10.1.36-1.el10_0.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "products": [ "AppStream-10.0.Z:tomcat-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-1:10.1.36-1.el10_0.src", "AppStream-10.0.Z:tomcat-admin-webapps-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-docs-webapp-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-el-5.0-api-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-jsp-3.1-api-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-lib-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-servlet-6.0-api-1:10.1.36-1.el10_0.noarch", "AppStream-10.0.Z:tomcat-webapps-1:10.1.36-1.el10_0.noarch" ] } ], "threats": [ { "category": "exploit_status", "date": "2025-04-01T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "tomcat: Potential RCE and/or information disclosure and/or information corruption with partial PUT" } ] }
rhsa-2025:3608
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat JBoss Web Server 6.1 is now available for Red Hat Enterprise Linux 8 and Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache Tomcat Servlet container, JBoss HTTP Connector (mod_cluster), the PicketLink Vault extension for Apache Tomcat, and the Tomcat Native library.\n\nThis release of Red Hat JBoss Web Server 6.1.0 serves as a replacement for Red Hat JBoss Web Server 6.0.5. This release includes bug fixes, enhancements and component upgrades, which are documented in the Release Notes that are linked to in the References section.\n\nSecurity Fix(es):\n\n* org.apache.tomcat/tomcat: Apache Tomcat: Authentication bypass when using Jakarta Authentication API [jws-6] (CVE-2024-52316)\n* tomcat: Potential RCE and/or information disclosure and/or information corruption with partial PUT [jws-6] (CVE-2025-24813)\n* tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame [jws-6] (CVE-2025-31650)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:3608", "url": "https://access.redhat.com/errata/RHSA-2025:3608" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_web_server/6.1/html/red_hat_jboss_web_server_6.1_release_notes/index", "url": "https://docs.redhat.com/en/documentation/red_hat_jboss_web_server/6.1/html/red_hat_jboss_web_server_6.1_release_notes/index" }, { "category": "external", "summary": "2326972", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2326972" }, { "category": "external", "summary": "2351129", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2351129" }, { "category": "external", "summary": "2362783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2362783" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_3608.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Web Server 6.1.0 release and security update", "tracking": { "current_release_date": "2025-08-03T13:24:39+00:00", "generator": { "date": "2025-08-03T13:24:39+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2025:3608", "initial_release_date": "2025-04-07T17:03:27+00:00", "revision_history": [ { "date": "2025-04-07T17:03:27+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-05-19T10:13:09+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-03T13:24:39+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Web Server 6.1 for RHEL 8", "product": { "name": "Red Hat JBoss Web Server 6.1 for RHEL 8", "product_id": "8Base-JWS-6.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:6.1::el8" } } }, { "category": "product_name", "name": "Red Hat JBoss Web Server 6.1 for RHEL 9", "product": { "name": "Red Hat JBoss Web Server 6.1 for RHEL 9", "product_id": "9Base-JWS-6.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:6.1::el9" } } } ], "category": "product_family", "name": "Red Hat JBoss Web Server" }, { "branches": [ { "category": "product_version", "name": "jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el8jws.src", "product": { "name": "jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el8jws.src", "product_id": "jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el8jws.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-jakartaee-migration@1.0.6-2.redhat_00003.1.el8jws?arch=src" } } }, { "category": "product_version", "name": "jws6-tomcat-native-0:1.3.1-1.redhat_1.el8jws.src", "product": { "name": "jws6-tomcat-native-0:1.3.1-1.redhat_1.el8jws.src", "product_id": "jws6-tomcat-native-0:1.3.1-1.redhat_1.el8jws.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-native@1.3.1-1.redhat_1.el8jws?arch=src" } } }, { "category": "product_version", "name": "jws6-tomcat-0:10.1.36-6.redhat_00007.1.el8jws.src", "product": { "name": "jws6-tomcat-0:10.1.36-6.redhat_00007.1.el8jws.src", "product_id": "jws6-tomcat-0:10.1.36-6.redhat_00007.1.el8jws.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat@10.1.36-6.redhat_00007.1.el8jws?arch=src" } } }, { "category": "product_version", "name": "jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el9jws.src", "product": { "name": "jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el9jws.src", "product_id": "jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el9jws.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-jakartaee-migration@1.0.6-2.redhat_00003.1.el9jws?arch=src" } } }, { "category": "product_version", "name": "jws6-tomcat-native-0:1.3.1-1.redhat_1.el9jws.src", "product": { "name": "jws6-tomcat-native-0:1.3.1-1.redhat_1.el9jws.src", "product_id": "jws6-tomcat-native-0:1.3.1-1.redhat_1.el9jws.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-native@1.3.1-1.redhat_1.el9jws?arch=src" } } }, { "category": "product_version", "name": "jws6-tomcat-0:10.1.36-6.redhat_00007.1.el9jws.src", "product": { "name": "jws6-tomcat-0:10.1.36-6.redhat_00007.1.el9jws.src", "product_id": "jws6-tomcat-0:10.1.36-6.redhat_00007.1.el9jws.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat@10.1.36-6.redhat_00007.1.el9jws?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el8jws.noarch", "product": { "name": "jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el8jws.noarch", "product_id": "jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-jakartaee-migration@1.0.6-2.redhat_00003.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws6-tomcat-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "product": { "name": "jws6-tomcat-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "product_id": "jws6-tomcat-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat@10.1.36-6.redhat_00007.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws6-tomcat-admin-webapps-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "product": { "name": "jws6-tomcat-admin-webapps-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "product_id": "jws6-tomcat-admin-webapps-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-admin-webapps@10.1.36-6.redhat_00007.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws6-tomcat-docs-webapp-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "product": { "name": "jws6-tomcat-docs-webapp-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "product_id": "jws6-tomcat-docs-webapp-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-docs-webapp@10.1.36-6.redhat_00007.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws6-tomcat-el-5.0-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "product": { "name": "jws6-tomcat-el-5.0-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "product_id": "jws6-tomcat-el-5.0-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-el-5.0-api@10.1.36-6.redhat_00007.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws6-tomcat-javadoc-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "product": { "name": "jws6-tomcat-javadoc-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "product_id": "jws6-tomcat-javadoc-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-javadoc@10.1.36-6.redhat_00007.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws6-tomcat-jsp-3.1-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "product": { "name": "jws6-tomcat-jsp-3.1-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "product_id": "jws6-tomcat-jsp-3.1-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-jsp-3.1-api@10.1.36-6.redhat_00007.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws6-tomcat-lib-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "product": { "name": "jws6-tomcat-lib-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "product_id": "jws6-tomcat-lib-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-lib@10.1.36-6.redhat_00007.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws6-tomcat-selinux-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "product": { "name": "jws6-tomcat-selinux-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "product_id": "jws6-tomcat-selinux-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-selinux@10.1.36-6.redhat_00007.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws6-tomcat-servlet-6.0-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "product": { "name": "jws6-tomcat-servlet-6.0-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "product_id": "jws6-tomcat-servlet-6.0-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-servlet-6.0-api@10.1.36-6.redhat_00007.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws6-tomcat-webapps-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "product": { "name": "jws6-tomcat-webapps-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "product_id": "jws6-tomcat-webapps-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-webapps@10.1.36-6.redhat_00007.1.el8jws?arch=noarch" } } }, { "category": "product_version", "name": "jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el9jws.noarch", "product": { "name": "jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el9jws.noarch", "product_id": "jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el9jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-jakartaee-migration@1.0.6-2.redhat_00003.1.el9jws?arch=noarch" } } }, { "category": "product_version", "name": "jws6-tomcat-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "product": { "name": "jws6-tomcat-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "product_id": "jws6-tomcat-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat@10.1.36-6.redhat_00007.1.el9jws?arch=noarch" } } }, { "category": "product_version", "name": "jws6-tomcat-admin-webapps-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "product": { "name": "jws6-tomcat-admin-webapps-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "product_id": "jws6-tomcat-admin-webapps-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-admin-webapps@10.1.36-6.redhat_00007.1.el9jws?arch=noarch" } } }, { "category": "product_version", "name": "jws6-tomcat-docs-webapp-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "product": { "name": "jws6-tomcat-docs-webapp-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "product_id": "jws6-tomcat-docs-webapp-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-docs-webapp@10.1.36-6.redhat_00007.1.el9jws?arch=noarch" } } }, { "category": "product_version", "name": "jws6-tomcat-el-5.0-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "product": { "name": "jws6-tomcat-el-5.0-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "product_id": "jws6-tomcat-el-5.0-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-el-5.0-api@10.1.36-6.redhat_00007.1.el9jws?arch=noarch" } } }, { "category": "product_version", "name": "jws6-tomcat-javadoc-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "product": { "name": "jws6-tomcat-javadoc-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "product_id": "jws6-tomcat-javadoc-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-javadoc@10.1.36-6.redhat_00007.1.el9jws?arch=noarch" } } }, { "category": "product_version", "name": "jws6-tomcat-jsp-3.1-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "product": { "name": "jws6-tomcat-jsp-3.1-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "product_id": "jws6-tomcat-jsp-3.1-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-jsp-3.1-api@10.1.36-6.redhat_00007.1.el9jws?arch=noarch" } } }, { "category": "product_version", "name": "jws6-tomcat-lib-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "product": { "name": "jws6-tomcat-lib-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "product_id": "jws6-tomcat-lib-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-lib@10.1.36-6.redhat_00007.1.el9jws?arch=noarch" } } }, { "category": "product_version", "name": "jws6-tomcat-selinux-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "product": { "name": "jws6-tomcat-selinux-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "product_id": "jws6-tomcat-selinux-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-selinux@10.1.36-6.redhat_00007.1.el9jws?arch=noarch" } } }, { "category": "product_version", "name": "jws6-tomcat-servlet-6.0-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "product": { "name": "jws6-tomcat-servlet-6.0-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "product_id": "jws6-tomcat-servlet-6.0-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-servlet-6.0-api@10.1.36-6.redhat_00007.1.el9jws?arch=noarch" } } }, { "category": "product_version", "name": "jws6-tomcat-webapps-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "product": { "name": "jws6-tomcat-webapps-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "product_id": "jws6-tomcat-webapps-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-webapps@10.1.36-6.redhat_00007.1.el9jws?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "jws6-tomcat-native-0:1.3.1-1.redhat_1.el8jws.x86_64", "product": { "name": "jws6-tomcat-native-0:1.3.1-1.redhat_1.el8jws.x86_64", "product_id": "jws6-tomcat-native-0:1.3.1-1.redhat_1.el8jws.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-native@1.3.1-1.redhat_1.el8jws?arch=x86_64" } } }, { "category": "product_version", "name": "jws6-tomcat-native-debuginfo-0:1.3.1-1.redhat_1.el8jws.x86_64", "product": { "name": "jws6-tomcat-native-debuginfo-0:1.3.1-1.redhat_1.el8jws.x86_64", "product_id": "jws6-tomcat-native-debuginfo-0:1.3.1-1.redhat_1.el8jws.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-native-debuginfo@1.3.1-1.redhat_1.el8jws?arch=x86_64" } } }, { "category": "product_version", "name": "jws6-tomcat-native-0:1.3.1-1.redhat_1.el9jws.x86_64", "product": { "name": "jws6-tomcat-native-0:1.3.1-1.redhat_1.el9jws.x86_64", "product_id": "jws6-tomcat-native-0:1.3.1-1.redhat_1.el9jws.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-native@1.3.1-1.redhat_1.el9jws?arch=x86_64" } } }, { "category": "product_version", "name": "jws6-tomcat-native-debuginfo-0:1.3.1-1.redhat_1.el9jws.x86_64", "product": { "name": "jws6-tomcat-native-debuginfo-0:1.3.1-1.redhat_1.el9jws.x86_64", "product_id": "jws6-tomcat-native-debuginfo-0:1.3.1-1.redhat_1.el9jws.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jws6-tomcat-native-debuginfo@1.3.1-1.redhat_1.el9jws?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-0:10.1.36-6.redhat_00007.1.el8jws.noarch as a component of Red Hat JBoss Web Server 6.1 for RHEL 8", "product_id": "8Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el8jws.noarch" }, "product_reference": "jws6-tomcat-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-0:10.1.36-6.redhat_00007.1.el8jws.src as a component of Red Hat JBoss Web Server 6.1 for RHEL 8", "product_id": "8Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el8jws.src" }, "product_reference": "jws6-tomcat-0:10.1.36-6.redhat_00007.1.el8jws.src", "relates_to_product_reference": "8Base-JWS-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-admin-webapps-0:10.1.36-6.redhat_00007.1.el8jws.noarch as a component of Red Hat JBoss Web Server 6.1 for RHEL 8", "product_id": "8Base-JWS-6.1:jws6-tomcat-admin-webapps-0:10.1.36-6.redhat_00007.1.el8jws.noarch" }, "product_reference": "jws6-tomcat-admin-webapps-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-docs-webapp-0:10.1.36-6.redhat_00007.1.el8jws.noarch as a component of Red Hat JBoss Web Server 6.1 for RHEL 8", "product_id": "8Base-JWS-6.1:jws6-tomcat-docs-webapp-0:10.1.36-6.redhat_00007.1.el8jws.noarch" }, "product_reference": "jws6-tomcat-docs-webapp-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-el-5.0-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch as a component of Red Hat JBoss Web Server 6.1 for RHEL 8", "product_id": "8Base-JWS-6.1:jws6-tomcat-el-5.0-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch" }, "product_reference": "jws6-tomcat-el-5.0-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el8jws.noarch as a component of Red Hat JBoss Web Server 6.1 for RHEL 8", "product_id": "8Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el8jws.noarch" }, "product_reference": "jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el8jws.src as a component of Red Hat JBoss Web Server 6.1 for RHEL 8", "product_id": "8Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el8jws.src" }, "product_reference": "jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el8jws.src", "relates_to_product_reference": "8Base-JWS-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-javadoc-0:10.1.36-6.redhat_00007.1.el8jws.noarch as a component of Red Hat JBoss Web Server 6.1 for RHEL 8", "product_id": "8Base-JWS-6.1:jws6-tomcat-javadoc-0:10.1.36-6.redhat_00007.1.el8jws.noarch" }, "product_reference": "jws6-tomcat-javadoc-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-jsp-3.1-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch as a component of Red Hat JBoss Web Server 6.1 for RHEL 8", "product_id": "8Base-JWS-6.1:jws6-tomcat-jsp-3.1-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch" }, "product_reference": "jws6-tomcat-jsp-3.1-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-lib-0:10.1.36-6.redhat_00007.1.el8jws.noarch as a component of Red Hat JBoss Web Server 6.1 for RHEL 8", "product_id": "8Base-JWS-6.1:jws6-tomcat-lib-0:10.1.36-6.redhat_00007.1.el8jws.noarch" }, "product_reference": "jws6-tomcat-lib-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-native-0:1.3.1-1.redhat_1.el8jws.src as a component of Red Hat JBoss Web Server 6.1 for RHEL 8", "product_id": "8Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el8jws.src" }, "product_reference": "jws6-tomcat-native-0:1.3.1-1.redhat_1.el8jws.src", "relates_to_product_reference": "8Base-JWS-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-native-0:1.3.1-1.redhat_1.el8jws.x86_64 as a component of Red Hat JBoss Web Server 6.1 for RHEL 8", "product_id": "8Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el8jws.x86_64" }, "product_reference": "jws6-tomcat-native-0:1.3.1-1.redhat_1.el8jws.x86_64", "relates_to_product_reference": "8Base-JWS-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-native-debuginfo-0:1.3.1-1.redhat_1.el8jws.x86_64 as a component of Red Hat JBoss Web Server 6.1 for RHEL 8", "product_id": "8Base-JWS-6.1:jws6-tomcat-native-debuginfo-0:1.3.1-1.redhat_1.el8jws.x86_64" }, "product_reference": "jws6-tomcat-native-debuginfo-0:1.3.1-1.redhat_1.el8jws.x86_64", "relates_to_product_reference": "8Base-JWS-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-selinux-0:10.1.36-6.redhat_00007.1.el8jws.noarch as a component of Red Hat JBoss Web Server 6.1 for RHEL 8", "product_id": "8Base-JWS-6.1:jws6-tomcat-selinux-0:10.1.36-6.redhat_00007.1.el8jws.noarch" }, "product_reference": "jws6-tomcat-selinux-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-servlet-6.0-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch as a component of Red Hat JBoss Web Server 6.1 for RHEL 8", "product_id": "8Base-JWS-6.1:jws6-tomcat-servlet-6.0-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch" }, "product_reference": "jws6-tomcat-servlet-6.0-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-webapps-0:10.1.36-6.redhat_00007.1.el8jws.noarch as a component of Red Hat JBoss Web Server 6.1 for RHEL 8", "product_id": "8Base-JWS-6.1:jws6-tomcat-webapps-0:10.1.36-6.redhat_00007.1.el8jws.noarch" }, "product_reference": "jws6-tomcat-webapps-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "relates_to_product_reference": "8Base-JWS-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-0:10.1.36-6.redhat_00007.1.el9jws.noarch as a component of Red Hat JBoss Web Server 6.1 for RHEL 9", "product_id": "9Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el9jws.noarch" }, "product_reference": "jws6-tomcat-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "relates_to_product_reference": "9Base-JWS-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-0:10.1.36-6.redhat_00007.1.el9jws.src as a component of Red Hat JBoss Web Server 6.1 for RHEL 9", "product_id": "9Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el9jws.src" }, "product_reference": "jws6-tomcat-0:10.1.36-6.redhat_00007.1.el9jws.src", "relates_to_product_reference": "9Base-JWS-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-admin-webapps-0:10.1.36-6.redhat_00007.1.el9jws.noarch as a component of Red Hat JBoss Web Server 6.1 for RHEL 9", "product_id": "9Base-JWS-6.1:jws6-tomcat-admin-webapps-0:10.1.36-6.redhat_00007.1.el9jws.noarch" }, "product_reference": "jws6-tomcat-admin-webapps-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "relates_to_product_reference": "9Base-JWS-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-docs-webapp-0:10.1.36-6.redhat_00007.1.el9jws.noarch as a component of Red Hat JBoss Web Server 6.1 for RHEL 9", "product_id": "9Base-JWS-6.1:jws6-tomcat-docs-webapp-0:10.1.36-6.redhat_00007.1.el9jws.noarch" }, "product_reference": "jws6-tomcat-docs-webapp-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "relates_to_product_reference": "9Base-JWS-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-el-5.0-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch as a component of Red Hat JBoss Web Server 6.1 for RHEL 9", "product_id": "9Base-JWS-6.1:jws6-tomcat-el-5.0-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch" }, "product_reference": "jws6-tomcat-el-5.0-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "relates_to_product_reference": "9Base-JWS-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el9jws.noarch as a component of Red Hat JBoss Web Server 6.1 for RHEL 9", "product_id": "9Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el9jws.noarch" }, "product_reference": "jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el9jws.noarch", "relates_to_product_reference": "9Base-JWS-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el9jws.src as a component of Red Hat JBoss Web Server 6.1 for RHEL 9", "product_id": "9Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el9jws.src" }, "product_reference": "jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el9jws.src", "relates_to_product_reference": "9Base-JWS-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-javadoc-0:10.1.36-6.redhat_00007.1.el9jws.noarch as a component of Red Hat JBoss Web Server 6.1 for RHEL 9", "product_id": "9Base-JWS-6.1:jws6-tomcat-javadoc-0:10.1.36-6.redhat_00007.1.el9jws.noarch" }, "product_reference": "jws6-tomcat-javadoc-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "relates_to_product_reference": "9Base-JWS-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-jsp-3.1-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch as a component of Red Hat JBoss Web Server 6.1 for RHEL 9", "product_id": "9Base-JWS-6.1:jws6-tomcat-jsp-3.1-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch" }, "product_reference": "jws6-tomcat-jsp-3.1-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "relates_to_product_reference": "9Base-JWS-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-lib-0:10.1.36-6.redhat_00007.1.el9jws.noarch as a component of Red Hat JBoss Web Server 6.1 for RHEL 9", "product_id": "9Base-JWS-6.1:jws6-tomcat-lib-0:10.1.36-6.redhat_00007.1.el9jws.noarch" }, "product_reference": "jws6-tomcat-lib-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "relates_to_product_reference": "9Base-JWS-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-native-0:1.3.1-1.redhat_1.el9jws.src as a component of Red Hat JBoss Web Server 6.1 for RHEL 9", "product_id": "9Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el9jws.src" }, "product_reference": "jws6-tomcat-native-0:1.3.1-1.redhat_1.el9jws.src", "relates_to_product_reference": "9Base-JWS-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-native-0:1.3.1-1.redhat_1.el9jws.x86_64 as a component of Red Hat JBoss Web Server 6.1 for RHEL 9", "product_id": "9Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el9jws.x86_64" }, "product_reference": "jws6-tomcat-native-0:1.3.1-1.redhat_1.el9jws.x86_64", "relates_to_product_reference": "9Base-JWS-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-native-debuginfo-0:1.3.1-1.redhat_1.el9jws.x86_64 as a component of Red Hat JBoss Web Server 6.1 for RHEL 9", "product_id": "9Base-JWS-6.1:jws6-tomcat-native-debuginfo-0:1.3.1-1.redhat_1.el9jws.x86_64" }, "product_reference": "jws6-tomcat-native-debuginfo-0:1.3.1-1.redhat_1.el9jws.x86_64", "relates_to_product_reference": "9Base-JWS-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-selinux-0:10.1.36-6.redhat_00007.1.el9jws.noarch as a component of Red Hat JBoss Web Server 6.1 for RHEL 9", "product_id": "9Base-JWS-6.1:jws6-tomcat-selinux-0:10.1.36-6.redhat_00007.1.el9jws.noarch" }, "product_reference": "jws6-tomcat-selinux-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "relates_to_product_reference": "9Base-JWS-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-servlet-6.0-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch as a component of Red Hat JBoss Web Server 6.1 for RHEL 9", "product_id": "9Base-JWS-6.1:jws6-tomcat-servlet-6.0-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch" }, "product_reference": "jws6-tomcat-servlet-6.0-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "relates_to_product_reference": "9Base-JWS-6.1" }, { "category": "default_component_of", "full_product_name": { "name": "jws6-tomcat-webapps-0:10.1.36-6.redhat_00007.1.el9jws.noarch as a component of Red Hat JBoss Web Server 6.1 for RHEL 9", "product_id": "9Base-JWS-6.1:jws6-tomcat-webapps-0:10.1.36-6.redhat_00007.1.el9jws.noarch" }, "product_reference": "jws6-tomcat-webapps-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "relates_to_product_reference": "9Base-JWS-6.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-52316", "cwe": { "id": "CWE-248", "name": "Uncaught Exception" }, "discovery_date": "2024-11-18T12:00:54.223330+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el8jws.src", "8Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el8jws.src", "8Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el8jws.x86_64", "8Base-JWS-6.1:jws6-tomcat-native-debuginfo-0:1.3.1-1.redhat_1.el8jws.x86_64", "9Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el9jws.src", "9Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el9jws.src", "9Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el9jws.x86_64", "9Base-JWS-6.1:jws6-tomcat-native-debuginfo-0:1.3.1-1.redhat_1.el9jws.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2326972" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache Tomcat when configured to use a custom Jakarta Authentication (formerly JASPIC) ServerAuthContext component. This vulnerability allows authentication bypass via improperly handled exceptions during the authentication process.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Apache Tomcat: Authentication bypass when using Jakarta Authentication API", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security has assessed this flaw at Attack Complexity as High, and impact metrics Confidentiality and Integrity as High, with a resultant base flaw Security Impact of Important. However, the factors involved in successful exploitation--usage of a custom Jakarta ServerAuthContext component, possible mishandling of exception management in that custom component, and failure in such a way as to allow a failed authentication to proceed in that exception mishandling--are sufficiently unlikely, such that Apache determined the impact to be Low. While Red Hat concurs with the worst-case assessment of Important for the base flaw, all products are assessed as Low, per individual risk assessment and in concurrence with Apache\u0027s rating.\n\nRed Hat Satellite is not directly impacted by this issue as it does not include the affected Tomcat package. However, Tomcat is consumed by Candlepin, a component of Satellite. Red Hat Satellite users are advised to check the impact state of Red Hat Enterprise Linux as any necessary fixes will be distributed through the platform.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el8jws.src", "8Base-JWS-6.1:jws6-tomcat-admin-webapps-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-docs-webapp-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-el-5.0-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-javadoc-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-jsp-3.1-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-lib-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-selinux-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-servlet-6.0-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-webapps-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "9Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el9jws.src", "9Base-JWS-6.1:jws6-tomcat-admin-webapps-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-docs-webapp-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-el-5.0-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-javadoc-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-jsp-3.1-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-lib-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-selinux-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-servlet-6.0-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-webapps-0:10.1.36-6.redhat_00007.1.el9jws.noarch" ], "known_not_affected": [ "8Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el8jws.src", "8Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el8jws.src", "8Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el8jws.x86_64", "8Base-JWS-6.1:jws6-tomcat-native-debuginfo-0:1.3.1-1.redhat_1.el8jws.x86_64", "9Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el9jws.src", "9Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el9jws.src", "9Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el9jws.x86_64", "9Base-JWS-6.1:jws6-tomcat-native-debuginfo-0:1.3.1-1.redhat_1.el9jws.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-52316" }, { "category": "external", "summary": "RHBZ#2326972", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2326972" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-52316", "url": "https://www.cve.org/CVERecord?id=CVE-2024-52316" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-52316", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-52316" }, { "category": "external", "summary": "https://lists.apache.org/thread/lopzlqh91jj9n334g02om08sbysdb928", "url": "https://lists.apache.org/thread/lopzlqh91jj9n334g02om08sbysdb928" } ], "release_date": "2024-11-18T11:32:22.072000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-04-07T17:03:27+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el8jws.src", "8Base-JWS-6.1:jws6-tomcat-admin-webapps-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-docs-webapp-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-el-5.0-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-javadoc-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-jsp-3.1-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-lib-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-selinux-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-servlet-6.0-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-webapps-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "9Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el9jws.src", "9Base-JWS-6.1:jws6-tomcat-admin-webapps-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-docs-webapp-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-el-5.0-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-javadoc-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-jsp-3.1-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-lib-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-selinux-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-servlet-6.0-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-webapps-0:10.1.36-6.redhat_00007.1.el9jws.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:3608" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "8Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el8jws.src", "8Base-JWS-6.1:jws6-tomcat-admin-webapps-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-docs-webapp-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-el-5.0-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el8jws.src", "8Base-JWS-6.1:jws6-tomcat-javadoc-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-jsp-3.1-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-lib-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el8jws.src", "8Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el8jws.x86_64", "8Base-JWS-6.1:jws6-tomcat-native-debuginfo-0:1.3.1-1.redhat_1.el8jws.x86_64", "8Base-JWS-6.1:jws6-tomcat-selinux-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-servlet-6.0-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-webapps-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "9Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el9jws.src", "9Base-JWS-6.1:jws6-tomcat-admin-webapps-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-docs-webapp-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-el-5.0-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el9jws.src", "9Base-JWS-6.1:jws6-tomcat-javadoc-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-jsp-3.1-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-lib-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el9jws.src", "9Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el9jws.x86_64", "9Base-JWS-6.1:jws6-tomcat-native-debuginfo-0:1.3.1-1.redhat_1.el9jws.x86_64", "9Base-JWS-6.1:jws6-tomcat-selinux-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-servlet-6.0-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-webapps-0:10.1.36-6.redhat_00007.1.el9jws.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "tomcat: Apache Tomcat: Authentication bypass when using Jakarta Authentication API" }, { "cve": "CVE-2025-24813", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2025-03-10T17:00:47.696071+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el8jws.src", "8Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el8jws.src", "8Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el8jws.x86_64", "8Base-JWS-6.1:jws6-tomcat-native-debuginfo-0:1.3.1-1.redhat_1.el8jws.x86_64", "9Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el9jws.src", "9Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el9jws.src", "9Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el9jws.x86_64", "9Base-JWS-6.1:jws6-tomcat-native-debuginfo-0:1.3.1-1.redhat_1.el9jws.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2351129" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache Tomcat. In certain conditions and configurations, this vulnerability allows a remote attacker to exploit a path equivalence flaw to view file system contents and add malicious content via a write-enabled\u00a0Default Servlet\u00a0in Apache Tomcat. \n\nFor the vulnerability to be exploited, the following conditions must be true: writes to the default servlet are enabled (disabled by default), sensitive file uploads are sub-directories of a target URL for public uploads, attackers know the names of the files, and those files are subject to partial PUT uploads enabled by default. If an application uses file-based session persistence with default storage and includes exploitable libraries, remote code execution (RCE) is possible.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Potential RCE and/or information disclosure and/or information corruption with partial PUT", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability has a Moderate impact (rather than Important) because it requires multiple non-default configurations to be exploitable, significantly limiting its impact in typical deployments. For remote code execution (RCE), exploitation requires both file-based session persistence and a library vulnerable to deserialization, further reducing its likelihood. For information disclosure or file injection, the attack is only possible if writes are enabled for the default servlet, partial PUT requests are supported, and sensitive file uploads occur within a publicly writable directory. The combination of all three of these conditions is uncommon in secure environments. Since most modern Tomcat deployments do not meet all these criteria simultaneously, the overall risk is reduced\n\nThe Tomcat package as shipped in Red Hat Enterprise Linux 6 and 7 is not affected by this vulnerability because the vulnerable code was introduced in a newer Tomcat version.\n\nRed Hat Satellite is not directly impacted by this issue as it does not include the affected Tomcat package. However, Tomcat is consumed by Candlepin, a component of Satellite. Red Hat Satellite users are advised to check the impact state of Red Hat Enterprise Linux as any necessary fixes will be distributed through the platform. Satellite configuration does not contain affected parameters that would make Tomcat vulnerable, therefore, even if a vulnerable Tomcat version is shipped with affected RHEL release alongside Satellite, there is no chance of it being exposed to flaw in Red Hat Satellite.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el8jws.src", "8Base-JWS-6.1:jws6-tomcat-admin-webapps-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-docs-webapp-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-el-5.0-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-javadoc-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-jsp-3.1-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-lib-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-selinux-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-servlet-6.0-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-webapps-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "9Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el9jws.src", "9Base-JWS-6.1:jws6-tomcat-admin-webapps-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-docs-webapp-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-el-5.0-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-javadoc-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-jsp-3.1-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-lib-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-selinux-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-servlet-6.0-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-webapps-0:10.1.36-6.redhat_00007.1.el9jws.noarch" ], "known_not_affected": [ "8Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el8jws.src", "8Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el8jws.src", "8Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el8jws.x86_64", "8Base-JWS-6.1:jws6-tomcat-native-debuginfo-0:1.3.1-1.redhat_1.el8jws.x86_64", "9Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el9jws.src", "9Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el9jws.src", "9Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el9jws.x86_64", "9Base-JWS-6.1:jws6-tomcat-native-debuginfo-0:1.3.1-1.redhat_1.el9jws.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24813" }, { "category": "external", "summary": "RHBZ#2351129", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2351129" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24813", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24813" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24813", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24813" }, { "category": "external", "summary": "https://lists.apache.org/thread/j5fkjv2k477os90nczf2v9l61fb0kkgq", "url": "https://lists.apache.org/thread/j5fkjv2k477os90nczf2v9l61fb0kkgq" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2025-03-10T16:44:03.715000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-04-07T17:03:27+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el8jws.src", "8Base-JWS-6.1:jws6-tomcat-admin-webapps-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-docs-webapp-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-el-5.0-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-javadoc-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-jsp-3.1-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-lib-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-selinux-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-servlet-6.0-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-webapps-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "9Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el9jws.src", "9Base-JWS-6.1:jws6-tomcat-admin-webapps-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-docs-webapp-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-el-5.0-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-javadoc-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-jsp-3.1-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-lib-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-selinux-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-servlet-6.0-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-webapps-0:10.1.36-6.redhat_00007.1.el9jws.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:3608" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el8jws.src", "8Base-JWS-6.1:jws6-tomcat-admin-webapps-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-docs-webapp-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-el-5.0-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el8jws.src", "8Base-JWS-6.1:jws6-tomcat-javadoc-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-jsp-3.1-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-lib-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el8jws.src", "8Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el8jws.x86_64", "8Base-JWS-6.1:jws6-tomcat-native-debuginfo-0:1.3.1-1.redhat_1.el8jws.x86_64", "8Base-JWS-6.1:jws6-tomcat-selinux-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-servlet-6.0-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-webapps-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "9Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el9jws.src", "9Base-JWS-6.1:jws6-tomcat-admin-webapps-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-docs-webapp-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-el-5.0-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el9jws.src", "9Base-JWS-6.1:jws6-tomcat-javadoc-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-jsp-3.1-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-lib-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el9jws.src", "9Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el9jws.x86_64", "9Base-JWS-6.1:jws6-tomcat-native-debuginfo-0:1.3.1-1.redhat_1.el9jws.x86_64", "9Base-JWS-6.1:jws6-tomcat-selinux-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-servlet-6.0-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-webapps-0:10.1.36-6.redhat_00007.1.el9jws.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "products": [ "8Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el8jws.src", "8Base-JWS-6.1:jws6-tomcat-admin-webapps-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-docs-webapp-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-el-5.0-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el8jws.src", "8Base-JWS-6.1:jws6-tomcat-javadoc-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-jsp-3.1-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-lib-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el8jws.src", "8Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el8jws.x86_64", "8Base-JWS-6.1:jws6-tomcat-native-debuginfo-0:1.3.1-1.redhat_1.el8jws.x86_64", "8Base-JWS-6.1:jws6-tomcat-selinux-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-servlet-6.0-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-webapps-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "9Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el9jws.src", "9Base-JWS-6.1:jws6-tomcat-admin-webapps-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-docs-webapp-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-el-5.0-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el9jws.src", "9Base-JWS-6.1:jws6-tomcat-javadoc-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-jsp-3.1-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-lib-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el9jws.src", "9Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el9jws.x86_64", "9Base-JWS-6.1:jws6-tomcat-native-debuginfo-0:1.3.1-1.redhat_1.el9jws.x86_64", "9Base-JWS-6.1:jws6-tomcat-selinux-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-servlet-6.0-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-webapps-0:10.1.36-6.redhat_00007.1.el9jws.noarch" ] } ], "threats": [ { "category": "exploit_status", "date": "2025-04-01T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "tomcat: Potential RCE and/or information disclosure and/or information corruption with partial PUT" }, { "cve": "CVE-2025-31650", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2025-04-28T20:00:59.032884+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2362783" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache Tomcat. This vulnerability allows an application-level denial of service (DoS), causing it to become unresponsive or slow via maliciously crafted HTTP/2 prioritization headers. It performs an incomplete cleanup of failed requests, which triggers a memory leak.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame", "title": "Vulnerability summary" }, { "category": "other", "text": "This is marked as Important vulnerability rather than a Moderate flaw because it introduces a reliable, unauthenticated denial-of-service (DoS) vector that exploits the core request-handling mechanism in Apache Tomcat. Specifically, the improper handling of invalid HTTP/2 Priority headers results in incomplete memory deallocation, creating a server-side memory leak. Unlike transient request errors that are gracefully handled and discarded, these malformed requests accumulate residual memory allocations over time. \n\nThis means an attacker can trigger an OutOfMemoryException simply by sending a large volume of crafted HTTP/2 requests, effectively rendering the server non-functional without needing authentication or access to specific endpoints. Given that HTTP/2 is widely used in production environments to improve performance, this vulnerability targets a default, high-traffic pathway, making it more impactful.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el8jws.src", "8Base-JWS-6.1:jws6-tomcat-admin-webapps-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-docs-webapp-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-el-5.0-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el8jws.src", "8Base-JWS-6.1:jws6-tomcat-javadoc-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-jsp-3.1-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-lib-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el8jws.src", "8Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el8jws.x86_64", "8Base-JWS-6.1:jws6-tomcat-native-debuginfo-0:1.3.1-1.redhat_1.el8jws.x86_64", "8Base-JWS-6.1:jws6-tomcat-selinux-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-servlet-6.0-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-webapps-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "9Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el9jws.src", "9Base-JWS-6.1:jws6-tomcat-admin-webapps-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-docs-webapp-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-el-5.0-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el9jws.src", "9Base-JWS-6.1:jws6-tomcat-javadoc-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-jsp-3.1-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-lib-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el9jws.src", "9Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el9jws.x86_64", "9Base-JWS-6.1:jws6-tomcat-native-debuginfo-0:1.3.1-1.redhat_1.el9jws.x86_64", "9Base-JWS-6.1:jws6-tomcat-selinux-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-servlet-6.0-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-webapps-0:10.1.36-6.redhat_00007.1.el9jws.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-31650" }, { "category": "external", "summary": "RHBZ#2362783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2362783" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-31650", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31650" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31650", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31650" }, { "category": "external", "summary": "https://lists.apache.org/thread/j6zzk0y3yym9pzfzkq5vcyxzz0yzh826", "url": "https://lists.apache.org/thread/j6zzk0y3yym9pzfzkq5vcyxzz0yzh826" } ], "release_date": "2025-04-28T19:14:31.107000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-04-07T17:03:27+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el8jws.src", "8Base-JWS-6.1:jws6-tomcat-admin-webapps-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-docs-webapp-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-el-5.0-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el8jws.src", "8Base-JWS-6.1:jws6-tomcat-javadoc-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-jsp-3.1-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-lib-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el8jws.src", "8Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el8jws.x86_64", "8Base-JWS-6.1:jws6-tomcat-native-debuginfo-0:1.3.1-1.redhat_1.el8jws.x86_64", "8Base-JWS-6.1:jws6-tomcat-selinux-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-servlet-6.0-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-webapps-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "9Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el9jws.src", "9Base-JWS-6.1:jws6-tomcat-admin-webapps-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-docs-webapp-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-el-5.0-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el9jws.src", "9Base-JWS-6.1:jws6-tomcat-javadoc-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-jsp-3.1-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-lib-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el9jws.src", "9Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el9jws.x86_64", "9Base-JWS-6.1:jws6-tomcat-native-debuginfo-0:1.3.1-1.redhat_1.el9jws.x86_64", "9Base-JWS-6.1:jws6-tomcat-selinux-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-servlet-6.0-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-webapps-0:10.1.36-6.redhat_00007.1.el9jws.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:3608" }, { "category": "workaround", "details": "Mitigation is either unavailable or does not meet Red Hat Product Security standards for usability, deployment, applicability, or stability.", "product_ids": [ "8Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el8jws.src", "8Base-JWS-6.1:jws6-tomcat-admin-webapps-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-docs-webapp-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-el-5.0-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el8jws.src", "8Base-JWS-6.1:jws6-tomcat-javadoc-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-jsp-3.1-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-lib-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el8jws.src", "8Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el8jws.x86_64", "8Base-JWS-6.1:jws6-tomcat-native-debuginfo-0:1.3.1-1.redhat_1.el8jws.x86_64", "8Base-JWS-6.1:jws6-tomcat-selinux-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-servlet-6.0-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-webapps-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "9Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el9jws.src", "9Base-JWS-6.1:jws6-tomcat-admin-webapps-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-docs-webapp-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-el-5.0-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el9jws.src", "9Base-JWS-6.1:jws6-tomcat-javadoc-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-jsp-3.1-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-lib-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el9jws.src", "9Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el9jws.x86_64", "9Base-JWS-6.1:jws6-tomcat-native-debuginfo-0:1.3.1-1.redhat_1.el9jws.x86_64", "9Base-JWS-6.1:jws6-tomcat-selinux-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-servlet-6.0-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-webapps-0:10.1.36-6.redhat_00007.1.el9jws.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el8jws.src", "8Base-JWS-6.1:jws6-tomcat-admin-webapps-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-docs-webapp-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-el-5.0-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el8jws.src", "8Base-JWS-6.1:jws6-tomcat-javadoc-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-jsp-3.1-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-lib-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el8jws.src", "8Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el8jws.x86_64", "8Base-JWS-6.1:jws6-tomcat-native-debuginfo-0:1.3.1-1.redhat_1.el8jws.x86_64", "8Base-JWS-6.1:jws6-tomcat-selinux-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-servlet-6.0-api-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "8Base-JWS-6.1:jws6-tomcat-webapps-0:10.1.36-6.redhat_00007.1.el8jws.noarch", "9Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-0:10.1.36-6.redhat_00007.1.el9jws.src", "9Base-JWS-6.1:jws6-tomcat-admin-webapps-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-docs-webapp-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-el-5.0-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-jakartaee-migration-0:1.0.6-2.redhat_00003.1.el9jws.src", "9Base-JWS-6.1:jws6-tomcat-javadoc-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-jsp-3.1-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-lib-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el9jws.src", "9Base-JWS-6.1:jws6-tomcat-native-0:1.3.1-1.redhat_1.el9jws.x86_64", "9Base-JWS-6.1:jws6-tomcat-native-debuginfo-0:1.3.1-1.redhat_1.el9jws.x86_64", "9Base-JWS-6.1:jws6-tomcat-selinux-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-servlet-6.0-api-0:10.1.36-6.redhat_00007.1.el9jws.noarch", "9Base-JWS-6.1:jws6-tomcat-webapps-0:10.1.36-6.redhat_00007.1.el9jws.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "tomcat: Apache Tomcat: DoS via malformed HTTP/2 PRIORITY_UPDATE frame" } ] }
ghsa-xcpr-7mr4-h4xq
Vulnerability from github
Unchecked Error Condition vulnerability in Apache Tomcat. If Tomcat is configured to use a custom Jakarta Authentication (formerly JASPIC) ServerAuthContext component which may throw an exception during the authentication process without explicitly setting an HTTP status to indicate failure, the authentication may not fail, allowing the user to bypass the authentication process. There are no known Jakarta Authentication components that behave in this way.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M26, from 10.1.0-M1 through 10.1.30, from 9.0.0-M1 through 9.0.95. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 though 8.5.100.
Users are recommended to upgrade to version 11.0.0, 10.1.31 or 9.0.96, which fix the issue.
{ "affected": [ { "package": { "ecosystem": "Maven", "name": "org.apache.tomcat:tomcat-catalina" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "9.0.96" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.tomcat:tomcat-catalina" }, "ranges": [ { "events": [ { "introduced": "10.1.0-M1" }, { "fixed": "10.1.30" } ], "type": "ECOSYSTEM" } ] }, { "database_specific": { "last_known_affected_version_range": "\u003c= 11.0.0-M26" }, "package": { "ecosystem": "Maven", "name": "org.apache.tomcat:tomcat-catalina" }, "ranges": [ { "events": [ { "introduced": "11.0.0-M1" }, { "fixed": "11.0.1" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2024-52316" ], "database_specific": { "cwe_ids": [ "CWE-391", "CWE-754" ], "github_reviewed": true, "github_reviewed_at": "2024-11-18T23:48:03Z", "nvd_published_at": "2024-11-18T12:15:18Z", "severity": "CRITICAL" }, "details": "Unchecked Error Condition vulnerability in Apache Tomcat. If Tomcat is configured to use a custom Jakarta Authentication (formerly JASPIC)\u00a0ServerAuthContext component which may throw an exception during the authentication process without explicitly setting an HTTP status to indicate failure, the authentication may not fail, allowing the user to bypass the authentication process. There are no known Jakarta\u00a0Authentication components that behave in this way.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M26, from 10.1.0-M1 through 10.1.30, from 9.0.0-M1 through 9.0.95. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 though 8.5.100.\n\nUsers are recommended to upgrade to version 11.0.0, 10.1.31 or 9.0.96, which fix the issue.", "id": "GHSA-xcpr-7mr4-h4xq", "modified": "2025-08-08T18:41:30Z", "published": "2024-11-18T12:30:43Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-52316" }, { "type": "WEB", "url": "https://github.com/apache/tomcat/commit/6d097a66746635df6880fe7662a792156b0eca14" }, { "type": "WEB", "url": "https://github.com/apache/tomcat/commit/7532f9dc4a8c37ec958f79dc82c4924a6c539223" }, { "type": "WEB", "url": "https://github.com/apache/tomcat/commit/acc2f01395f895980f5d8a64573fcc1bade13369" }, { "type": "PACKAGE", "url": "https://github.com/apache/tomcat" }, { "type": "WEB", "url": "https://lists.apache.org/thread/lopzlqh91jj9n334g02om08sbysdb928" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20250124-0003" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2024/11/18/2" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ], "summary": "Apache Tomcat - Authentication Bypass" }
opensuse-su-2024:14525-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "tomcat-9.0.97-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the tomcat-9.0.97-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-14525", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_14525-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2024:14525-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FEBEOHC6Y3SRYDWBQ2D6PJCZOXW2QQ4Y/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2024:14525-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FEBEOHC6Y3SRYDWBQ2D6PJCZOXW2QQ4Y/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-52316 page", "url": "https://www.suse.com/security/cve/CVE-2024-52316/" } ], "title": "tomcat-9.0.97-1.1 on GA media", "tracking": { "current_release_date": "2024-11-25T00:00:00Z", "generator": { "date": "2024-11-25T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:14525-1", "initial_release_date": "2024-11-25T00:00:00Z", "revision_history": [ { "date": "2024-11-25T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "tomcat-9.0.97-1.1.aarch64", "product": { "name": "tomcat-9.0.97-1.1.aarch64", "product_id": "tomcat-9.0.97-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat-admin-webapps-9.0.97-1.1.aarch64", "product": { "name": "tomcat-admin-webapps-9.0.97-1.1.aarch64", "product_id": "tomcat-admin-webapps-9.0.97-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat-docs-webapp-9.0.97-1.1.aarch64", "product": { "name": "tomcat-docs-webapp-9.0.97-1.1.aarch64", "product_id": "tomcat-docs-webapp-9.0.97-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat-el-3_0-api-9.0.97-1.1.aarch64", "product": { "name": "tomcat-el-3_0-api-9.0.97-1.1.aarch64", "product_id": "tomcat-el-3_0-api-9.0.97-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat-embed-9.0.97-1.1.aarch64", "product": { "name": "tomcat-embed-9.0.97-1.1.aarch64", "product_id": "tomcat-embed-9.0.97-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat-javadoc-9.0.97-1.1.aarch64", "product": { "name": "tomcat-javadoc-9.0.97-1.1.aarch64", "product_id": "tomcat-javadoc-9.0.97-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat-jsp-2_3-api-9.0.97-1.1.aarch64", "product": { "name": "tomcat-jsp-2_3-api-9.0.97-1.1.aarch64", "product_id": "tomcat-jsp-2_3-api-9.0.97-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat-jsvc-9.0.97-1.1.aarch64", "product": { "name": "tomcat-jsvc-9.0.97-1.1.aarch64", "product_id": "tomcat-jsvc-9.0.97-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat-lib-9.0.97-1.1.aarch64", "product": { "name": "tomcat-lib-9.0.97-1.1.aarch64", "product_id": "tomcat-lib-9.0.97-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat-servlet-4_0-api-9.0.97-1.1.aarch64", "product": { "name": "tomcat-servlet-4_0-api-9.0.97-1.1.aarch64", "product_id": "tomcat-servlet-4_0-api-9.0.97-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat-webapps-9.0.97-1.1.aarch64", "product": { "name": "tomcat-webapps-9.0.97-1.1.aarch64", "product_id": "tomcat-webapps-9.0.97-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "tomcat-9.0.97-1.1.ppc64le", "product": { "name": "tomcat-9.0.97-1.1.ppc64le", "product_id": "tomcat-9.0.97-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat-admin-webapps-9.0.97-1.1.ppc64le", "product": { "name": "tomcat-admin-webapps-9.0.97-1.1.ppc64le", "product_id": "tomcat-admin-webapps-9.0.97-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat-docs-webapp-9.0.97-1.1.ppc64le", "product": { "name": "tomcat-docs-webapp-9.0.97-1.1.ppc64le", "product_id": "tomcat-docs-webapp-9.0.97-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat-el-3_0-api-9.0.97-1.1.ppc64le", "product": { "name": "tomcat-el-3_0-api-9.0.97-1.1.ppc64le", "product_id": "tomcat-el-3_0-api-9.0.97-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat-embed-9.0.97-1.1.ppc64le", "product": { "name": "tomcat-embed-9.0.97-1.1.ppc64le", "product_id": "tomcat-embed-9.0.97-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat-javadoc-9.0.97-1.1.ppc64le", "product": { "name": "tomcat-javadoc-9.0.97-1.1.ppc64le", "product_id": "tomcat-javadoc-9.0.97-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat-jsp-2_3-api-9.0.97-1.1.ppc64le", "product": { "name": "tomcat-jsp-2_3-api-9.0.97-1.1.ppc64le", "product_id": "tomcat-jsp-2_3-api-9.0.97-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat-jsvc-9.0.97-1.1.ppc64le", "product": { "name": "tomcat-jsvc-9.0.97-1.1.ppc64le", "product_id": "tomcat-jsvc-9.0.97-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat-lib-9.0.97-1.1.ppc64le", "product": { "name": "tomcat-lib-9.0.97-1.1.ppc64le", "product_id": "tomcat-lib-9.0.97-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat-servlet-4_0-api-9.0.97-1.1.ppc64le", "product": { "name": "tomcat-servlet-4_0-api-9.0.97-1.1.ppc64le", "product_id": "tomcat-servlet-4_0-api-9.0.97-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat-webapps-9.0.97-1.1.ppc64le", "product": { "name": "tomcat-webapps-9.0.97-1.1.ppc64le", "product_id": "tomcat-webapps-9.0.97-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "tomcat-9.0.97-1.1.s390x", "product": { "name": "tomcat-9.0.97-1.1.s390x", "product_id": "tomcat-9.0.97-1.1.s390x" } }, { "category": "product_version", "name": "tomcat-admin-webapps-9.0.97-1.1.s390x", "product": { "name": "tomcat-admin-webapps-9.0.97-1.1.s390x", "product_id": "tomcat-admin-webapps-9.0.97-1.1.s390x" } }, { "category": "product_version", "name": "tomcat-docs-webapp-9.0.97-1.1.s390x", "product": { "name": "tomcat-docs-webapp-9.0.97-1.1.s390x", "product_id": "tomcat-docs-webapp-9.0.97-1.1.s390x" } }, { "category": "product_version", "name": "tomcat-el-3_0-api-9.0.97-1.1.s390x", "product": { "name": "tomcat-el-3_0-api-9.0.97-1.1.s390x", "product_id": "tomcat-el-3_0-api-9.0.97-1.1.s390x" } }, { "category": "product_version", "name": "tomcat-embed-9.0.97-1.1.s390x", "product": { "name": "tomcat-embed-9.0.97-1.1.s390x", "product_id": "tomcat-embed-9.0.97-1.1.s390x" } }, { "category": "product_version", "name": "tomcat-javadoc-9.0.97-1.1.s390x", "product": { "name": "tomcat-javadoc-9.0.97-1.1.s390x", "product_id": "tomcat-javadoc-9.0.97-1.1.s390x" } }, { "category": "product_version", "name": "tomcat-jsp-2_3-api-9.0.97-1.1.s390x", "product": { "name": "tomcat-jsp-2_3-api-9.0.97-1.1.s390x", "product_id": "tomcat-jsp-2_3-api-9.0.97-1.1.s390x" } }, { "category": "product_version", "name": "tomcat-jsvc-9.0.97-1.1.s390x", "product": { "name": "tomcat-jsvc-9.0.97-1.1.s390x", "product_id": "tomcat-jsvc-9.0.97-1.1.s390x" } }, { "category": "product_version", "name": "tomcat-lib-9.0.97-1.1.s390x", "product": { "name": "tomcat-lib-9.0.97-1.1.s390x", "product_id": "tomcat-lib-9.0.97-1.1.s390x" } }, { "category": "product_version", "name": "tomcat-servlet-4_0-api-9.0.97-1.1.s390x", "product": { "name": "tomcat-servlet-4_0-api-9.0.97-1.1.s390x", "product_id": "tomcat-servlet-4_0-api-9.0.97-1.1.s390x" } }, { "category": "product_version", "name": "tomcat-webapps-9.0.97-1.1.s390x", "product": { "name": "tomcat-webapps-9.0.97-1.1.s390x", "product_id": "tomcat-webapps-9.0.97-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "tomcat-9.0.97-1.1.x86_64", "product": { "name": "tomcat-9.0.97-1.1.x86_64", "product_id": "tomcat-9.0.97-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat-admin-webapps-9.0.97-1.1.x86_64", "product": { "name": "tomcat-admin-webapps-9.0.97-1.1.x86_64", "product_id": "tomcat-admin-webapps-9.0.97-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat-docs-webapp-9.0.97-1.1.x86_64", "product": { "name": "tomcat-docs-webapp-9.0.97-1.1.x86_64", "product_id": "tomcat-docs-webapp-9.0.97-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat-el-3_0-api-9.0.97-1.1.x86_64", "product": { "name": "tomcat-el-3_0-api-9.0.97-1.1.x86_64", "product_id": "tomcat-el-3_0-api-9.0.97-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat-embed-9.0.97-1.1.x86_64", "product": { "name": "tomcat-embed-9.0.97-1.1.x86_64", "product_id": "tomcat-embed-9.0.97-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat-javadoc-9.0.97-1.1.x86_64", "product": { "name": "tomcat-javadoc-9.0.97-1.1.x86_64", "product_id": "tomcat-javadoc-9.0.97-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat-jsp-2_3-api-9.0.97-1.1.x86_64", "product": { "name": "tomcat-jsp-2_3-api-9.0.97-1.1.x86_64", "product_id": "tomcat-jsp-2_3-api-9.0.97-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat-jsvc-9.0.97-1.1.x86_64", "product": { "name": "tomcat-jsvc-9.0.97-1.1.x86_64", "product_id": "tomcat-jsvc-9.0.97-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat-lib-9.0.97-1.1.x86_64", "product": { "name": "tomcat-lib-9.0.97-1.1.x86_64", "product_id": "tomcat-lib-9.0.97-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat-servlet-4_0-api-9.0.97-1.1.x86_64", "product": { "name": "tomcat-servlet-4_0-api-9.0.97-1.1.x86_64", "product_id": "tomcat-servlet-4_0-api-9.0.97-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat-webapps-9.0.97-1.1.x86_64", "product": { "name": "tomcat-webapps-9.0.97-1.1.x86_64", "product_id": "tomcat-webapps-9.0.97-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.97-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-9.0.97-1.1.aarch64" }, "product_reference": "tomcat-9.0.97-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.97-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-9.0.97-1.1.ppc64le" }, "product_reference": "tomcat-9.0.97-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.97-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-9.0.97-1.1.s390x" }, "product_reference": "tomcat-9.0.97-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-9.0.97-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-9.0.97-1.1.x86_64" }, "product_reference": "tomcat-9.0.97-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.97-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.97-1.1.aarch64" }, "product_reference": "tomcat-admin-webapps-9.0.97-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.97-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.97-1.1.ppc64le" }, "product_reference": "tomcat-admin-webapps-9.0.97-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.97-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.97-1.1.s390x" }, "product_reference": "tomcat-admin-webapps-9.0.97-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-admin-webapps-9.0.97-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.97-1.1.x86_64" }, "product_reference": "tomcat-admin-webapps-9.0.97-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-docs-webapp-9.0.97-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.97-1.1.aarch64" }, "product_reference": "tomcat-docs-webapp-9.0.97-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-docs-webapp-9.0.97-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.97-1.1.ppc64le" }, "product_reference": "tomcat-docs-webapp-9.0.97-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-docs-webapp-9.0.97-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.97-1.1.s390x" }, "product_reference": "tomcat-docs-webapp-9.0.97-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-docs-webapp-9.0.97-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.97-1.1.x86_64" }, "product_reference": "tomcat-docs-webapp-9.0.97-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.97-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.97-1.1.aarch64" }, "product_reference": "tomcat-el-3_0-api-9.0.97-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.97-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.97-1.1.ppc64le" }, "product_reference": "tomcat-el-3_0-api-9.0.97-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.97-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.97-1.1.s390x" }, "product_reference": "tomcat-el-3_0-api-9.0.97-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-el-3_0-api-9.0.97-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.97-1.1.x86_64" }, "product_reference": "tomcat-el-3_0-api-9.0.97-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-embed-9.0.97-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-embed-9.0.97-1.1.aarch64" }, "product_reference": "tomcat-embed-9.0.97-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-embed-9.0.97-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-embed-9.0.97-1.1.ppc64le" }, "product_reference": "tomcat-embed-9.0.97-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-embed-9.0.97-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-embed-9.0.97-1.1.s390x" }, "product_reference": "tomcat-embed-9.0.97-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-embed-9.0.97-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-embed-9.0.97-1.1.x86_64" }, "product_reference": "tomcat-embed-9.0.97-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-javadoc-9.0.97-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-javadoc-9.0.97-1.1.aarch64" }, "product_reference": "tomcat-javadoc-9.0.97-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-javadoc-9.0.97-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-javadoc-9.0.97-1.1.ppc64le" }, "product_reference": "tomcat-javadoc-9.0.97-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-javadoc-9.0.97-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-javadoc-9.0.97-1.1.s390x" }, "product_reference": "tomcat-javadoc-9.0.97-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-javadoc-9.0.97-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-javadoc-9.0.97-1.1.x86_64" }, "product_reference": "tomcat-javadoc-9.0.97-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.97-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.97-1.1.aarch64" }, "product_reference": "tomcat-jsp-2_3-api-9.0.97-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.97-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.97-1.1.ppc64le" }, "product_reference": "tomcat-jsp-2_3-api-9.0.97-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.97-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.97-1.1.s390x" }, "product_reference": "tomcat-jsp-2_3-api-9.0.97-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsp-2_3-api-9.0.97-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.97-1.1.x86_64" }, "product_reference": "tomcat-jsp-2_3-api-9.0.97-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsvc-9.0.97-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-jsvc-9.0.97-1.1.aarch64" }, "product_reference": "tomcat-jsvc-9.0.97-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsvc-9.0.97-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-jsvc-9.0.97-1.1.ppc64le" }, "product_reference": "tomcat-jsvc-9.0.97-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsvc-9.0.97-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-jsvc-9.0.97-1.1.s390x" }, "product_reference": "tomcat-jsvc-9.0.97-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-jsvc-9.0.97-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-jsvc-9.0.97-1.1.x86_64" }, "product_reference": "tomcat-jsvc-9.0.97-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.97-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-lib-9.0.97-1.1.aarch64" }, "product_reference": "tomcat-lib-9.0.97-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.97-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-lib-9.0.97-1.1.ppc64le" }, "product_reference": "tomcat-lib-9.0.97-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.97-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-lib-9.0.97-1.1.s390x" }, "product_reference": "tomcat-lib-9.0.97-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-lib-9.0.97-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-lib-9.0.97-1.1.x86_64" }, "product_reference": "tomcat-lib-9.0.97-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.97-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.97-1.1.aarch64" }, "product_reference": "tomcat-servlet-4_0-api-9.0.97-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.97-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.97-1.1.ppc64le" }, "product_reference": "tomcat-servlet-4_0-api-9.0.97-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.97-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.97-1.1.s390x" }, "product_reference": "tomcat-servlet-4_0-api-9.0.97-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-servlet-4_0-api-9.0.97-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.97-1.1.x86_64" }, "product_reference": "tomcat-servlet-4_0-api-9.0.97-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.97-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-webapps-9.0.97-1.1.aarch64" }, "product_reference": "tomcat-webapps-9.0.97-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.97-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-webapps-9.0.97-1.1.ppc64le" }, "product_reference": "tomcat-webapps-9.0.97-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.97-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-webapps-9.0.97-1.1.s390x" }, "product_reference": "tomcat-webapps-9.0.97-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-webapps-9.0.97-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat-webapps-9.0.97-1.1.x86_64" }, "product_reference": "tomcat-webapps-9.0.97-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-52316", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-52316" } ], "notes": [ { "category": "general", "text": "Unchecked Error Condition vulnerability in Apache Tomcat. If Tomcat is configured to use a custom Jakarta Authentication (formerly JASPIC) ServerAuthContext component which may throw an exception during the authentication process without explicitly setting an HTTP status to indicate failure, the authentication may not fail, allowing the user to bypass the authentication process. There are no known Jakarta Authentication components that behave in this way.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M26, from 10.1.0-M1 through 10.1.30, from 9.0.0-M1 through 9.0.95.\n\nThe following versions were EOL at the time the CVE was created but are \nknown to be affected: 8.5.0 though 8.5.100.\n\n\nUsers are recommended to upgrade to version 11.0.0, 10.1.31 or 9.0.96, which fix the issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:tomcat-9.0.97-1.1.aarch64", "openSUSE Tumbleweed:tomcat-9.0.97-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-9.0.97-1.1.s390x", "openSUSE Tumbleweed:tomcat-9.0.97-1.1.x86_64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.97-1.1.aarch64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.97-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.97-1.1.s390x", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.97-1.1.x86_64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.97-1.1.aarch64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.97-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.97-1.1.s390x", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.97-1.1.x86_64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.97-1.1.aarch64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.97-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.97-1.1.s390x", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.97-1.1.x86_64", "openSUSE Tumbleweed:tomcat-embed-9.0.97-1.1.aarch64", "openSUSE Tumbleweed:tomcat-embed-9.0.97-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-embed-9.0.97-1.1.s390x", "openSUSE Tumbleweed:tomcat-embed-9.0.97-1.1.x86_64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.97-1.1.aarch64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.97-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-javadoc-9.0.97-1.1.s390x", "openSUSE Tumbleweed:tomcat-javadoc-9.0.97-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.97-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.97-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.97-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.97-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.97-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.97-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsvc-9.0.97-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsvc-9.0.97-1.1.x86_64", "openSUSE Tumbleweed:tomcat-lib-9.0.97-1.1.aarch64", "openSUSE Tumbleweed:tomcat-lib-9.0.97-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-lib-9.0.97-1.1.s390x", "openSUSE Tumbleweed:tomcat-lib-9.0.97-1.1.x86_64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.97-1.1.aarch64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.97-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.97-1.1.s390x", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.97-1.1.x86_64", "openSUSE Tumbleweed:tomcat-webapps-9.0.97-1.1.aarch64", "openSUSE Tumbleweed:tomcat-webapps-9.0.97-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-webapps-9.0.97-1.1.s390x", "openSUSE Tumbleweed:tomcat-webapps-9.0.97-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-52316", "url": "https://www.suse.com/security/cve/CVE-2024-52316" }, { "category": "external", "summary": "SUSE Bug 1233434 for CVE-2024-52316", "url": "https://bugzilla.suse.com/1233434" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:tomcat-9.0.97-1.1.aarch64", "openSUSE Tumbleweed:tomcat-9.0.97-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-9.0.97-1.1.s390x", "openSUSE Tumbleweed:tomcat-9.0.97-1.1.x86_64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.97-1.1.aarch64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.97-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.97-1.1.s390x", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.97-1.1.x86_64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.97-1.1.aarch64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.97-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.97-1.1.s390x", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.97-1.1.x86_64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.97-1.1.aarch64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.97-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.97-1.1.s390x", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.97-1.1.x86_64", "openSUSE Tumbleweed:tomcat-embed-9.0.97-1.1.aarch64", "openSUSE Tumbleweed:tomcat-embed-9.0.97-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-embed-9.0.97-1.1.s390x", "openSUSE Tumbleweed:tomcat-embed-9.0.97-1.1.x86_64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.97-1.1.aarch64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.97-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-javadoc-9.0.97-1.1.s390x", "openSUSE Tumbleweed:tomcat-javadoc-9.0.97-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.97-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.97-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.97-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.97-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.97-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.97-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsvc-9.0.97-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsvc-9.0.97-1.1.x86_64", "openSUSE Tumbleweed:tomcat-lib-9.0.97-1.1.aarch64", "openSUSE Tumbleweed:tomcat-lib-9.0.97-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-lib-9.0.97-1.1.s390x", "openSUSE Tumbleweed:tomcat-lib-9.0.97-1.1.x86_64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.97-1.1.aarch64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.97-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.97-1.1.s390x", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.97-1.1.x86_64", "openSUSE Tumbleweed:tomcat-webapps-9.0.97-1.1.aarch64", "openSUSE Tumbleweed:tomcat-webapps-9.0.97-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-webapps-9.0.97-1.1.s390x", "openSUSE Tumbleweed:tomcat-webapps-9.0.97-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:tomcat-9.0.97-1.1.aarch64", "openSUSE Tumbleweed:tomcat-9.0.97-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-9.0.97-1.1.s390x", "openSUSE Tumbleweed:tomcat-9.0.97-1.1.x86_64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.97-1.1.aarch64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.97-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.97-1.1.s390x", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.97-1.1.x86_64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.97-1.1.aarch64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.97-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.97-1.1.s390x", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.97-1.1.x86_64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.97-1.1.aarch64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.97-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.97-1.1.s390x", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.97-1.1.x86_64", "openSUSE Tumbleweed:tomcat-embed-9.0.97-1.1.aarch64", "openSUSE Tumbleweed:tomcat-embed-9.0.97-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-embed-9.0.97-1.1.s390x", "openSUSE Tumbleweed:tomcat-embed-9.0.97-1.1.x86_64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.97-1.1.aarch64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.97-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-javadoc-9.0.97-1.1.s390x", "openSUSE Tumbleweed:tomcat-javadoc-9.0.97-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.97-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.97-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.97-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.97-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.97-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.97-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsvc-9.0.97-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsvc-9.0.97-1.1.x86_64", "openSUSE Tumbleweed:tomcat-lib-9.0.97-1.1.aarch64", "openSUSE Tumbleweed:tomcat-lib-9.0.97-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-lib-9.0.97-1.1.s390x", "openSUSE Tumbleweed:tomcat-lib-9.0.97-1.1.x86_64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.97-1.1.aarch64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.97-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.97-1.1.s390x", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.97-1.1.x86_64", "openSUSE Tumbleweed:tomcat-webapps-9.0.97-1.1.aarch64", "openSUSE Tumbleweed:tomcat-webapps-9.0.97-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-webapps-9.0.97-1.1.s390x", "openSUSE Tumbleweed:tomcat-webapps-9.0.97-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-11-25T00:00:00Z", "details": "critical" } ], "title": "CVE-2024-52316" } ] }
opensuse-su-2024:14526-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "tomcat10-10.1.33-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the tomcat10-10.1.33-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-14526", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_14526-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2024:14526-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NS3LHXFR3WDPWX6RO57TRBMRMR4673EV/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2024:14526-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NS3LHXFR3WDPWX6RO57TRBMRMR4673EV/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-52316 page", "url": "https://www.suse.com/security/cve/CVE-2024-52316/" } ], "title": "tomcat10-10.1.33-1.1 on GA media", "tracking": { "current_release_date": "2024-11-25T00:00:00Z", "generator": { "date": "2024-11-25T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:14526-1", "initial_release_date": "2024-11-25T00:00:00Z", "revision_history": [ { "date": "2024-11-25T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "tomcat10-10.1.33-1.1.aarch64", "product": { "name": "tomcat10-10.1.33-1.1.aarch64", "product_id": "tomcat10-10.1.33-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat10-admin-webapps-10.1.33-1.1.aarch64", "product": { "name": "tomcat10-admin-webapps-10.1.33-1.1.aarch64", "product_id": "tomcat10-admin-webapps-10.1.33-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat10-doc-10.1.33-1.1.aarch64", "product": { "name": "tomcat10-doc-10.1.33-1.1.aarch64", "product_id": "tomcat10-doc-10.1.33-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat10-docs-webapp-10.1.33-1.1.aarch64", "product": { "name": "tomcat10-docs-webapp-10.1.33-1.1.aarch64", "product_id": "tomcat10-docs-webapp-10.1.33-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat10-el-5_0-api-10.1.33-1.1.aarch64", "product": { "name": "tomcat10-el-5_0-api-10.1.33-1.1.aarch64", "product_id": "tomcat10-el-5_0-api-10.1.33-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat10-embed-10.1.33-1.1.aarch64", "product": { "name": "tomcat10-embed-10.1.33-1.1.aarch64", "product_id": "tomcat10-embed-10.1.33-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat10-jsp-3_1-api-10.1.33-1.1.aarch64", "product": { "name": "tomcat10-jsp-3_1-api-10.1.33-1.1.aarch64", "product_id": "tomcat10-jsp-3_1-api-10.1.33-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat10-jsvc-10.1.33-1.1.aarch64", "product": { "name": "tomcat10-jsvc-10.1.33-1.1.aarch64", "product_id": "tomcat10-jsvc-10.1.33-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat10-lib-10.1.33-1.1.aarch64", "product": { "name": "tomcat10-lib-10.1.33-1.1.aarch64", "product_id": "tomcat10-lib-10.1.33-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat10-servlet-6_0-api-10.1.33-1.1.aarch64", "product": { "name": "tomcat10-servlet-6_0-api-10.1.33-1.1.aarch64", "product_id": "tomcat10-servlet-6_0-api-10.1.33-1.1.aarch64" } }, { "category": "product_version", "name": "tomcat10-webapps-10.1.33-1.1.aarch64", "product": { "name": "tomcat10-webapps-10.1.33-1.1.aarch64", "product_id": "tomcat10-webapps-10.1.33-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "tomcat10-10.1.33-1.1.ppc64le", "product": { "name": "tomcat10-10.1.33-1.1.ppc64le", "product_id": "tomcat10-10.1.33-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat10-admin-webapps-10.1.33-1.1.ppc64le", "product": { "name": "tomcat10-admin-webapps-10.1.33-1.1.ppc64le", "product_id": "tomcat10-admin-webapps-10.1.33-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat10-doc-10.1.33-1.1.ppc64le", "product": { "name": "tomcat10-doc-10.1.33-1.1.ppc64le", "product_id": "tomcat10-doc-10.1.33-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat10-docs-webapp-10.1.33-1.1.ppc64le", "product": { "name": "tomcat10-docs-webapp-10.1.33-1.1.ppc64le", "product_id": "tomcat10-docs-webapp-10.1.33-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat10-el-5_0-api-10.1.33-1.1.ppc64le", "product": { "name": "tomcat10-el-5_0-api-10.1.33-1.1.ppc64le", "product_id": "tomcat10-el-5_0-api-10.1.33-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat10-embed-10.1.33-1.1.ppc64le", "product": { "name": "tomcat10-embed-10.1.33-1.1.ppc64le", "product_id": "tomcat10-embed-10.1.33-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat10-jsp-3_1-api-10.1.33-1.1.ppc64le", "product": { "name": "tomcat10-jsp-3_1-api-10.1.33-1.1.ppc64le", "product_id": "tomcat10-jsp-3_1-api-10.1.33-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat10-jsvc-10.1.33-1.1.ppc64le", "product": { "name": "tomcat10-jsvc-10.1.33-1.1.ppc64le", "product_id": "tomcat10-jsvc-10.1.33-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat10-lib-10.1.33-1.1.ppc64le", "product": { "name": "tomcat10-lib-10.1.33-1.1.ppc64le", "product_id": "tomcat10-lib-10.1.33-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat10-servlet-6_0-api-10.1.33-1.1.ppc64le", "product": { "name": "tomcat10-servlet-6_0-api-10.1.33-1.1.ppc64le", "product_id": "tomcat10-servlet-6_0-api-10.1.33-1.1.ppc64le" } }, { "category": "product_version", "name": "tomcat10-webapps-10.1.33-1.1.ppc64le", "product": { "name": "tomcat10-webapps-10.1.33-1.1.ppc64le", "product_id": "tomcat10-webapps-10.1.33-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "tomcat10-10.1.33-1.1.s390x", "product": { "name": "tomcat10-10.1.33-1.1.s390x", "product_id": "tomcat10-10.1.33-1.1.s390x" } }, { "category": "product_version", "name": "tomcat10-admin-webapps-10.1.33-1.1.s390x", "product": { "name": "tomcat10-admin-webapps-10.1.33-1.1.s390x", "product_id": "tomcat10-admin-webapps-10.1.33-1.1.s390x" } }, { "category": "product_version", "name": "tomcat10-doc-10.1.33-1.1.s390x", "product": { "name": "tomcat10-doc-10.1.33-1.1.s390x", "product_id": "tomcat10-doc-10.1.33-1.1.s390x" } }, { "category": "product_version", "name": "tomcat10-docs-webapp-10.1.33-1.1.s390x", "product": { "name": "tomcat10-docs-webapp-10.1.33-1.1.s390x", "product_id": "tomcat10-docs-webapp-10.1.33-1.1.s390x" } }, { "category": "product_version", "name": "tomcat10-el-5_0-api-10.1.33-1.1.s390x", "product": { "name": "tomcat10-el-5_0-api-10.1.33-1.1.s390x", "product_id": "tomcat10-el-5_0-api-10.1.33-1.1.s390x" } }, { "category": "product_version", "name": "tomcat10-embed-10.1.33-1.1.s390x", "product": { "name": "tomcat10-embed-10.1.33-1.1.s390x", "product_id": "tomcat10-embed-10.1.33-1.1.s390x" } }, { "category": "product_version", "name": "tomcat10-jsp-3_1-api-10.1.33-1.1.s390x", "product": { "name": "tomcat10-jsp-3_1-api-10.1.33-1.1.s390x", "product_id": "tomcat10-jsp-3_1-api-10.1.33-1.1.s390x" } }, { "category": "product_version", "name": "tomcat10-jsvc-10.1.33-1.1.s390x", "product": { "name": "tomcat10-jsvc-10.1.33-1.1.s390x", "product_id": "tomcat10-jsvc-10.1.33-1.1.s390x" } }, { "category": "product_version", "name": "tomcat10-lib-10.1.33-1.1.s390x", "product": { "name": "tomcat10-lib-10.1.33-1.1.s390x", "product_id": "tomcat10-lib-10.1.33-1.1.s390x" } }, { "category": "product_version", "name": "tomcat10-servlet-6_0-api-10.1.33-1.1.s390x", "product": { "name": "tomcat10-servlet-6_0-api-10.1.33-1.1.s390x", "product_id": "tomcat10-servlet-6_0-api-10.1.33-1.1.s390x" } }, { "category": "product_version", "name": "tomcat10-webapps-10.1.33-1.1.s390x", "product": { "name": "tomcat10-webapps-10.1.33-1.1.s390x", "product_id": "tomcat10-webapps-10.1.33-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "tomcat10-10.1.33-1.1.x86_64", "product": { "name": "tomcat10-10.1.33-1.1.x86_64", "product_id": "tomcat10-10.1.33-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat10-admin-webapps-10.1.33-1.1.x86_64", "product": { "name": "tomcat10-admin-webapps-10.1.33-1.1.x86_64", "product_id": "tomcat10-admin-webapps-10.1.33-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat10-doc-10.1.33-1.1.x86_64", "product": { "name": "tomcat10-doc-10.1.33-1.1.x86_64", "product_id": "tomcat10-doc-10.1.33-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat10-docs-webapp-10.1.33-1.1.x86_64", "product": { "name": "tomcat10-docs-webapp-10.1.33-1.1.x86_64", "product_id": "tomcat10-docs-webapp-10.1.33-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat10-el-5_0-api-10.1.33-1.1.x86_64", "product": { "name": "tomcat10-el-5_0-api-10.1.33-1.1.x86_64", "product_id": "tomcat10-el-5_0-api-10.1.33-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat10-embed-10.1.33-1.1.x86_64", "product": { "name": "tomcat10-embed-10.1.33-1.1.x86_64", "product_id": "tomcat10-embed-10.1.33-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat10-jsp-3_1-api-10.1.33-1.1.x86_64", "product": { "name": "tomcat10-jsp-3_1-api-10.1.33-1.1.x86_64", "product_id": "tomcat10-jsp-3_1-api-10.1.33-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat10-jsvc-10.1.33-1.1.x86_64", "product": { "name": "tomcat10-jsvc-10.1.33-1.1.x86_64", "product_id": "tomcat10-jsvc-10.1.33-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat10-lib-10.1.33-1.1.x86_64", "product": { "name": "tomcat10-lib-10.1.33-1.1.x86_64", "product_id": "tomcat10-lib-10.1.33-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat10-servlet-6_0-api-10.1.33-1.1.x86_64", "product": { "name": "tomcat10-servlet-6_0-api-10.1.33-1.1.x86_64", "product_id": "tomcat10-servlet-6_0-api-10.1.33-1.1.x86_64" } }, { "category": "product_version", "name": "tomcat10-webapps-10.1.33-1.1.x86_64", "product": { "name": "tomcat10-webapps-10.1.33-1.1.x86_64", "product_id": "tomcat10-webapps-10.1.33-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tomcat10-10.1.33-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-10.1.33-1.1.aarch64" }, "product_reference": "tomcat10-10.1.33-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-10.1.33-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-10.1.33-1.1.ppc64le" }, "product_reference": "tomcat10-10.1.33-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-10.1.33-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-10.1.33-1.1.s390x" }, "product_reference": "tomcat10-10.1.33-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-10.1.33-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-10.1.33-1.1.x86_64" }, "product_reference": "tomcat10-10.1.33-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-admin-webapps-10.1.33-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.33-1.1.aarch64" }, "product_reference": "tomcat10-admin-webapps-10.1.33-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-admin-webapps-10.1.33-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.33-1.1.ppc64le" }, "product_reference": "tomcat10-admin-webapps-10.1.33-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-admin-webapps-10.1.33-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.33-1.1.s390x" }, "product_reference": "tomcat10-admin-webapps-10.1.33-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-admin-webapps-10.1.33-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.33-1.1.x86_64" }, "product_reference": "tomcat10-admin-webapps-10.1.33-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-doc-10.1.33-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-doc-10.1.33-1.1.aarch64" }, "product_reference": "tomcat10-doc-10.1.33-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-doc-10.1.33-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-doc-10.1.33-1.1.ppc64le" }, "product_reference": "tomcat10-doc-10.1.33-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-doc-10.1.33-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-doc-10.1.33-1.1.s390x" }, "product_reference": "tomcat10-doc-10.1.33-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-doc-10.1.33-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-doc-10.1.33-1.1.x86_64" }, "product_reference": "tomcat10-doc-10.1.33-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-docs-webapp-10.1.33-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.33-1.1.aarch64" }, "product_reference": "tomcat10-docs-webapp-10.1.33-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-docs-webapp-10.1.33-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.33-1.1.ppc64le" }, "product_reference": "tomcat10-docs-webapp-10.1.33-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-docs-webapp-10.1.33-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.33-1.1.s390x" }, "product_reference": "tomcat10-docs-webapp-10.1.33-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-docs-webapp-10.1.33-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.33-1.1.x86_64" }, "product_reference": "tomcat10-docs-webapp-10.1.33-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-el-5_0-api-10.1.33-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.33-1.1.aarch64" }, "product_reference": "tomcat10-el-5_0-api-10.1.33-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-el-5_0-api-10.1.33-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.33-1.1.ppc64le" }, "product_reference": "tomcat10-el-5_0-api-10.1.33-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-el-5_0-api-10.1.33-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.33-1.1.s390x" }, "product_reference": "tomcat10-el-5_0-api-10.1.33-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-el-5_0-api-10.1.33-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.33-1.1.x86_64" }, "product_reference": "tomcat10-el-5_0-api-10.1.33-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-embed-10.1.33-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-embed-10.1.33-1.1.aarch64" }, "product_reference": "tomcat10-embed-10.1.33-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-embed-10.1.33-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-embed-10.1.33-1.1.ppc64le" }, "product_reference": "tomcat10-embed-10.1.33-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-embed-10.1.33-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-embed-10.1.33-1.1.s390x" }, "product_reference": "tomcat10-embed-10.1.33-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-embed-10.1.33-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-embed-10.1.33-1.1.x86_64" }, "product_reference": "tomcat10-embed-10.1.33-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-jsp-3_1-api-10.1.33-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.33-1.1.aarch64" }, "product_reference": "tomcat10-jsp-3_1-api-10.1.33-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-jsp-3_1-api-10.1.33-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.33-1.1.ppc64le" }, "product_reference": "tomcat10-jsp-3_1-api-10.1.33-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-jsp-3_1-api-10.1.33-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.33-1.1.s390x" }, "product_reference": "tomcat10-jsp-3_1-api-10.1.33-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-jsp-3_1-api-10.1.33-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.33-1.1.x86_64" }, "product_reference": "tomcat10-jsp-3_1-api-10.1.33-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-jsvc-10.1.33-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-jsvc-10.1.33-1.1.aarch64" }, "product_reference": "tomcat10-jsvc-10.1.33-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-jsvc-10.1.33-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-jsvc-10.1.33-1.1.ppc64le" }, "product_reference": "tomcat10-jsvc-10.1.33-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-jsvc-10.1.33-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-jsvc-10.1.33-1.1.s390x" }, "product_reference": "tomcat10-jsvc-10.1.33-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-jsvc-10.1.33-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-jsvc-10.1.33-1.1.x86_64" }, "product_reference": "tomcat10-jsvc-10.1.33-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-lib-10.1.33-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-lib-10.1.33-1.1.aarch64" }, "product_reference": "tomcat10-lib-10.1.33-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-lib-10.1.33-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-lib-10.1.33-1.1.ppc64le" }, "product_reference": "tomcat10-lib-10.1.33-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-lib-10.1.33-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-lib-10.1.33-1.1.s390x" }, "product_reference": "tomcat10-lib-10.1.33-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-lib-10.1.33-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-lib-10.1.33-1.1.x86_64" }, "product_reference": "tomcat10-lib-10.1.33-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-servlet-6_0-api-10.1.33-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.33-1.1.aarch64" }, "product_reference": "tomcat10-servlet-6_0-api-10.1.33-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-servlet-6_0-api-10.1.33-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.33-1.1.ppc64le" }, "product_reference": "tomcat10-servlet-6_0-api-10.1.33-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-servlet-6_0-api-10.1.33-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.33-1.1.s390x" }, "product_reference": "tomcat10-servlet-6_0-api-10.1.33-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-servlet-6_0-api-10.1.33-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.33-1.1.x86_64" }, "product_reference": "tomcat10-servlet-6_0-api-10.1.33-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-webapps-10.1.33-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-webapps-10.1.33-1.1.aarch64" }, "product_reference": "tomcat10-webapps-10.1.33-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-webapps-10.1.33-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-webapps-10.1.33-1.1.ppc64le" }, "product_reference": "tomcat10-webapps-10.1.33-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-webapps-10.1.33-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-webapps-10.1.33-1.1.s390x" }, "product_reference": "tomcat10-webapps-10.1.33-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat10-webapps-10.1.33-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:tomcat10-webapps-10.1.33-1.1.x86_64" }, "product_reference": "tomcat10-webapps-10.1.33-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-52316", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-52316" } ], "notes": [ { "category": "general", "text": "Unchecked Error Condition vulnerability in Apache Tomcat. If Tomcat is configured to use a custom Jakarta Authentication (formerly JASPIC) ServerAuthContext component which may throw an exception during the authentication process without explicitly setting an HTTP status to indicate failure, the authentication may not fail, allowing the user to bypass the authentication process. There are no known Jakarta Authentication components that behave in this way.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M26, from 10.1.0-M1 through 10.1.30, from 9.0.0-M1 through 9.0.95.\n\nThe following versions were EOL at the time the CVE was created but are \nknown to be affected: 8.5.0 though 8.5.100.\n\n\nUsers are recommended to upgrade to version 11.0.0, 10.1.31 or 9.0.96, which fix the issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:tomcat10-10.1.33-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-10.1.33-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-10.1.33-1.1.s390x", "openSUSE Tumbleweed:tomcat10-10.1.33-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.33-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.33-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.33-1.1.s390x", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.33-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-doc-10.1.33-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-doc-10.1.33-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-doc-10.1.33-1.1.s390x", "openSUSE Tumbleweed:tomcat10-doc-10.1.33-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.33-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.33-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.33-1.1.s390x", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.33-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.33-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.33-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.33-1.1.s390x", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.33-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-embed-10.1.33-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-embed-10.1.33-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-embed-10.1.33-1.1.s390x", "openSUSE Tumbleweed:tomcat10-embed-10.1.33-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.33-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.33-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.33-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.33-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.33-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.33-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.33-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.33-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-lib-10.1.33-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-lib-10.1.33-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-lib-10.1.33-1.1.s390x", "openSUSE Tumbleweed:tomcat10-lib-10.1.33-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.33-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.33-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.33-1.1.s390x", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.33-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.33-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.33-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-webapps-10.1.33-1.1.s390x", "openSUSE Tumbleweed:tomcat10-webapps-10.1.33-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-52316", "url": "https://www.suse.com/security/cve/CVE-2024-52316" }, { "category": "external", "summary": "SUSE Bug 1233434 for CVE-2024-52316", "url": "https://bugzilla.suse.com/1233434" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:tomcat10-10.1.33-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-10.1.33-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-10.1.33-1.1.s390x", "openSUSE Tumbleweed:tomcat10-10.1.33-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.33-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.33-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.33-1.1.s390x", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.33-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-doc-10.1.33-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-doc-10.1.33-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-doc-10.1.33-1.1.s390x", "openSUSE Tumbleweed:tomcat10-doc-10.1.33-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.33-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.33-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.33-1.1.s390x", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.33-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.33-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.33-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.33-1.1.s390x", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.33-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-embed-10.1.33-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-embed-10.1.33-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-embed-10.1.33-1.1.s390x", "openSUSE Tumbleweed:tomcat10-embed-10.1.33-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.33-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.33-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.33-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.33-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.33-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.33-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.33-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.33-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-lib-10.1.33-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-lib-10.1.33-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-lib-10.1.33-1.1.s390x", "openSUSE Tumbleweed:tomcat10-lib-10.1.33-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.33-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.33-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.33-1.1.s390x", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.33-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.33-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.33-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-webapps-10.1.33-1.1.s390x", "openSUSE Tumbleweed:tomcat10-webapps-10.1.33-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:tomcat10-10.1.33-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-10.1.33-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-10.1.33-1.1.s390x", "openSUSE Tumbleweed:tomcat10-10.1.33-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.33-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.33-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.33-1.1.s390x", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.33-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-doc-10.1.33-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-doc-10.1.33-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-doc-10.1.33-1.1.s390x", "openSUSE Tumbleweed:tomcat10-doc-10.1.33-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.33-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.33-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.33-1.1.s390x", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.33-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.33-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.33-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.33-1.1.s390x", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.33-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-embed-10.1.33-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-embed-10.1.33-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-embed-10.1.33-1.1.s390x", "openSUSE Tumbleweed:tomcat10-embed-10.1.33-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.33-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.33-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.33-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.33-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.33-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.33-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.33-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.33-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-lib-10.1.33-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-lib-10.1.33-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-lib-10.1.33-1.1.s390x", "openSUSE Tumbleweed:tomcat10-lib-10.1.33-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.33-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.33-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.33-1.1.s390x", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.33-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.33-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.33-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-webapps-10.1.33-1.1.s390x", "openSUSE Tumbleweed:tomcat10-webapps-10.1.33-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-11-25T00:00:00Z", "details": "critical" } ], "title": "CVE-2024-52316" } ] }
fkie_cve-2024-52316
Vulnerability from fkie_nvd
▶ | URL | Tags | |
---|---|---|---|
security@apache.org | https://lists.apache.org/thread/lopzlqh91jj9n334g02om08sbysdb928 | Mailing List, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2024/11/18/2 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20250124-0003/ | Third Party Advisory |
Vendor | Product | Version | |
---|---|---|---|
apache | tomcat | * | |
apache | tomcat | * | |
apache | tomcat | 11.0.0 | |
apache | tomcat | 11.0.0 | |
apache | tomcat | 11.0.0 | |
apache | tomcat | 11.0.0 | |
apache | tomcat | 11.0.0 | |
apache | tomcat | 11.0.0 | |
apache | tomcat | 11.0.0 | |
apache | tomcat | 11.0.0 | |
apache | tomcat | 11.0.0 | |
apache | tomcat | 11.0.0 | |
apache | tomcat | 11.0.0 | |
apache | tomcat | 11.0.0 | |
apache | tomcat | 11.0.0 | |
apache | tomcat | 11.0.0 | |
apache | tomcat | 11.0.0 | |
apache | tomcat | 11.0.0 | |
apache | tomcat | 11.0.0 | |
apache | tomcat | 11.0.0 | |
apache | tomcat | 11.0.0 | |
apache | tomcat | 11.0.0 | |
apache | tomcat | 11.0.0 | |
apache | tomcat | 11.0.0 | |
apache | tomcat | 11.0.0 | |
apache | tomcat | 11.0.0 | |
apache | tomcat | 11.0.0 | |
apache | tomcat | 11.0.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*", "matchCriteriaId": "60FA749D-28A3-49C8-9041-B8E9917A9692", "versionEndExcluding": "9.0.96", "versionStartIncluding": "9.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*", "matchCriteriaId": "670B1FF2-1D4F-4717-843F-146AB420473F", "versionEndExcluding": "10.1.31", "versionStartIncluding": "10.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:11.0.0:milestone1:*:*:*:*:*:*", "matchCriteriaId": "D1AA7FF6-E8E7-4BF6-983E-0A99B0183008", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:11.0.0:milestone10:*:*:*:*:*:*", "matchCriteriaId": "57088BDD-A136-45EF-A8A1-2EBF79CEC2CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:11.0.0:milestone11:*:*:*:*:*:*", "matchCriteriaId": "B32D1D7A-A04F-444E-8F45-BB9A9E4B0199", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:11.0.0:milestone12:*:*:*:*:*:*", "matchCriteriaId": "0092FB35-3B00-484F-A24D-7828396A4FF6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:11.0.0:milestone13:*:*:*:*:*:*", "matchCriteriaId": "CB557E88-FA9D-4B69-AA6F-EAEE7F9B01AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:11.0.0:milestone14:*:*:*:*:*:*", "matchCriteriaId": "72D3C6F1-84FA-4F82-96C1-9A8DA1C1F30F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:11.0.0:milestone15:*:*:*:*:*:*", "matchCriteriaId": "3521C81B-37D9-48FC-9540-D0D333B9A4A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:11.0.0:milestone16:*:*:*:*:*:*", "matchCriteriaId": "02A84634-A8F2-4BA9-B9F3-BEF36AEC5480", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:11.0.0:milestone17:*:*:*:*:*:*", "matchCriteriaId": "ECBBC1F1-C86B-40AF-B740-A99F6B27682A", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:11.0.0:milestone18:*:*:*:*:*:*", "matchCriteriaId": "9D2206B2-F3FF-43F2-B3E2-3CAAC64C691D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:11.0.0:milestone19:*:*:*:*:*:*", "matchCriteriaId": "0495A538-4102-40D0-A35C-0179CFD52A9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:11.0.0:milestone2:*:*:*:*:*:*", "matchCriteriaId": "2AAD52CE-94F5-4F98-A027-9A7E68818CB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:11.0.0:milestone20:*:*:*:*:*:*", "matchCriteriaId": "77BA6600-0890-4BA1-B447-EC1746BAB4FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:11.0.0:milestone21:*:*:*:*:*:*", "matchCriteriaId": "7914D26B-CBD6-4846-9BD3-403708D69319", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:11.0.0:milestone22:*:*:*:*:*:*", "matchCriteriaId": "123C6285-03BE-49FC-B821-8BDB25D02863", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:11.0.0:milestone23:*:*:*:*:*:*", "matchCriteriaId": "8A28C2E2-B7BC-46CE-94E4-AE3EF172AA47", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:11.0.0:milestone24:*:*:*:*:*:*", "matchCriteriaId": "069B0D8E-8223-4C4E-A834-C6235D6C3450", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:11.0.0:milestone25:*:*:*:*:*:*", "matchCriteriaId": "E6282085-5716-4874-B0B0-180ECDEE128F", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:11.0.0:milestone26:*:*:*:*:*:*", "matchCriteriaId": "899B6FF0-8701-47E7-8EDA-428A6D48786D", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:11.0.0:milestone3:*:*:*:*:*:*", "matchCriteriaId": "F1F981F5-035A-4EDD-8A9F-481EE8BC7FF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:11.0.0:milestone4:*:*:*:*:*:*", "matchCriteriaId": "03A171AF-2EC8-4422-912C-547CDB58CAAA", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:11.0.0:milestone5:*:*:*:*:*:*", "matchCriteriaId": "538E68C4-0BA4-495F-AEF8-4EF6EE7963CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:11.0.0:milestone6:*:*:*:*:*:*", "matchCriteriaId": "49350A6E-5E1D-45B2-A874-3B8601B3ADCC", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:11.0.0:milestone7:*:*:*:*:*:*", "matchCriteriaId": "5F50942F-DF54-46C0-8371-9A476DD3EEA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:11.0.0:milestone8:*:*:*:*:*:*", "matchCriteriaId": "D12C2C95-B79F-4AA4-8CE3-99A3EE7991AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:tomcat:11.0.0:milestone9:*:*:*:*:*:*", "matchCriteriaId": "98792138-DD56-42DF-9612-3BDC65EEC117", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unchecked Error Condition vulnerability in Apache Tomcat. If Tomcat is configured to use a custom Jakarta Authentication (formerly JASPIC)\u00a0ServerAuthContext component which may throw an exception during the authentication process without explicitly setting an HTTP status to indicate failure, the authentication may not fail, allowing the user to bypass the authentication process. There are no known Jakarta\u00a0Authentication components that behave in this way.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M26, from 10.1.0-M1 through 10.1.30, from 9.0.0-M1 through 9.0.95.\n\nThe following versions were EOL at the time the CVE was created but are \nknown to be affected: 8.5.0 though 8.5.100.\n\n\nUsers are recommended to upgrade to version 11.0.0, 10.1.31 or 9.0.96, which fix the issue." }, { "lang": "es", "value": "Vulnerabilidad de condici\u00f3n de error no comprobada en Apache Tomcat. Si Tomcat est\u00e1 configurado para utilizar un componente ServerAuthContext de autenticaci\u00f3n de Jakarta (anteriormente JASPIC) personalizado que puede generar una excepci\u00f3n durante el proceso de autenticaci\u00f3n sin establecer expl\u00edcitamente un estado HTTP para indicar un error, la autenticaci\u00f3n puede no fallar, lo que permite al usuario omitir el proceso de autenticaci\u00f3n. No se conocen componentes de autenticaci\u00f3n de Jakarta que se comporten de esta manera. Este problema afecta a Apache Tomcat: desde 11.0.0-M1 hasta 11.0.0-M26, desde 10.1.0-M1 hasta 10.1.30, desde 9.0.0-M1 hasta 9.0.95. Se recomienda a los usuarios que actualicen a la versi\u00f3n 11.0.0, 10.1.31 o 9.0.96, que solucionan el problema." } ], "id": "CVE-2024-52316", "lastModified": "2025-08-08T12:15:26.917", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2024-11-18T12:15:18.600", "references": [ { "source": "security@apache.org", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread/lopzlqh91jj9n334g02om08sbysdb928" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2024/11/18/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20250124-0003/" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Undergoing Analysis", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-391" } ], "source": "security@apache.org", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-754" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
wid-sec-w-2024-3486
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Apache Tomcat ist ein Web-Applikationsserver f\u00fcr verschiedene Plattformen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Apache Tomcat ausnutzen, um Sicherheitsvorkehrungen zu umgehen und um falsche Informationen darzustellen.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-3486 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3486.json" }, { "category": "self", "summary": "WID-SEC-2024-3486 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3486" }, { "category": "external", "summary": "Fixed in Apache Tomcat 11.0.0 vom 2024-11-17", "url": "https://tomcat.apache.org/security-11.html" }, { "category": "external", "summary": "Fixed in Apache Tomcat 10.1.31 vom 2024-11-17", "url": "https://tomcat.apache.org/security-10.html" }, { "category": "external", "summary": "Fixed in Apache Tomcat 9.0.96 vom 2024-11-17", "url": "https://tomcat.apache.org/security-9.html" }, { "category": "external", "summary": "openSUSE Security Update OPENSUSE-SU-2024:14526-1 vom 2024-11-26", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/NS3LHXFR3WDPWX6RO57TRBMRMR4673EV/" }, { "category": "external", "summary": "openSUSE Security Update OPENSUSE-SU-2024:14525-1 vom 2024-11-26", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/FEBEOHC6Y3SRYDWBQ2D6PJCZOXW2QQ4Y/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4075-1 vom 2024-11-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019848.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4105-1 vom 2024-11-28", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/6BALUYPW7LQJCC2GHB7Q6UAUAUMJGZH4/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4106-1 vom 2024-11-28", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019866.html" }, { "category": "external", "summary": "IBM Security Bulletin 7179164 vom 2024-12-17", "url": "https://www.ibm.com/support/pages/node/7179164" }, { "category": "external", "summary": "Dell Security Advisory DSA-2025-031 vom 2025-01-02", "url": "https://www.dell.com/support/kbdoc/de-de/000267482/dsa-2025-031-dell-openmanage-server-administrator-omsa-security-update-for-apache-tomcat-unchecked-error-condition-vulnerability" }, { "category": "external", "summary": "SUSE Security Update vom 2025-01-08", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/R2IT7I6R7IICWNFTQM2VQTVL5JMUZMA4/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0058-1 vom 2025-01-10", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/BU742OOISJIJHU3XWFKULNL4LCEVGEXC/" }, { "category": "external", "summary": "IBM Security Bulletin 7180700 vom 2025-01-10", "url": "https://www.ibm.com/support/pages/node/7180700" }, { "category": "external", "summary": "Debian Security Advisory DLA-4017 vom 2025-01-17", "url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00009.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-5845 vom 2025-01-17", "url": "https://lists.debian.org/debian-security-announce/2025/msg00007.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASTOMCAT9-2025-015 vom 2025-01-24", "url": "https://alas.aws.amazon.com/AL2/ALASTOMCAT9-2025-015.html" }, { "category": "external", "summary": "IBM Security Bulletin 7183569 vom 2025-02-18", "url": "https://www.ibm.com/support/pages/node/7183569" }, { "category": "external", "summary": "openSUSE Security Update OPENSUSE-SU-2025:14911-1 vom 2025-03-20", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RRUAQGNMRHOXHMBGLDCLHP5REBY5WNI3/" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:3609 vom 2025-04-07", "url": "https://access.redhat.com/errata/RHSA-2025:3609" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:3608 vom 2025-04-08", "url": "https://access.redhat.com/errata/RHSA-2025:3608" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:7497 vom 2025-05-13", "url": "https://access.redhat.com/errata/RHSA-2025:7497" }, { "category": "external", "summary": "IBM Security Bulletin 7237707 vom 2025-06-24", "url": "https://www.ibm.com/support/pages/node/7237707" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-7497 vom 2025-06-30", "url": "https://linux.oracle.com/errata/ELSA-2025-7497.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2TOMCAT9-2025-015 vom 2025-07-01", "url": "https://alas.aws.amazon.com/AL2/ALAS2TOMCAT9-2025-015.html" } ], "source_lang": "en-US", "title": "Apache Tomcat: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-06-30T22:00:00.000+00:00", "generator": { "date": "2025-07-01T08:33:09.701+00:00", "engine": { "name": "BSI-WID", "version": "1.3.12" } }, "id": "WID-SEC-W-2024-3486", "initial_release_date": "2024-11-17T23:00:00.000+00:00", "revision_history": [ { "date": "2024-11-17T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-11-26T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von openSUSE aufgenommen" }, { "date": "2024-11-27T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-11-28T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-12-17T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-01-02T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Dell aufgenommen" }, { "date": "2025-01-07T23:00:00.000+00:00", "number": "7", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-01-09T23:00:00.000+00:00", "number": "8", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-01-12T23:00:00.000+00:00", "number": "9", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-01-16T23:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-01-19T23:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-01-26T23:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-02-18T23:00:00.000+00:00", "number": "13", "summary": "Neue Updates von IBM und IBM-APAR aufgenommen" }, { "date": "2025-03-20T23:00:00.000+00:00", "number": "14", "summary": "Neue Updates von openSUSE aufgenommen" }, { "date": "2025-04-07T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-05-13T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-06-23T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-06-30T22:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Oracle Linux und Amazon aufgenommen" } ], "status": "final", "version": "18" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c11.0.0", "product": { "name": "Apache Tomcat \u003c11.0.0", "product_id": "T039220" } }, { "category": "product_version", "name": "11.0.0", "product": { "name": "Apache Tomcat 11.0.0", "product_id": "T039220-fixed", "product_identification_helper": { "cpe": "cpe:/a:apache:tomcat:11.0.0" } } }, { "category": "product_version_range", "name": "\u003c10.1.31", "product": { "name": "Apache Tomcat \u003c10.1.31", "product_id": "T039221" } }, { "category": "product_version", "name": "10.1.31", "product": { "name": "Apache Tomcat 10.1.31", "product_id": "T039221-fixed", "product_identification_helper": { "cpe": "cpe:/a:apache:tomcat:10.1.31" } } }, { "category": "product_version_range", "name": "\u003c9.0.96", "product": { "name": "Apache Tomcat \u003c9.0.96", "product_id": "T039222" } }, { "category": "product_version", "name": "9.0.96", "product": { "name": "Apache Tomcat 9.0.96", "product_id": "T039222-fixed", "product_identification_helper": { "cpe": "cpe:/a:apache:tomcat:9.0.96" } } } ], "category": "product_name", "name": "Tomcat" } ], "category": "vendor", "name": "Apache" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c11.1.0.0", "product": { "name": "Dell OpenManage Server Administrator \u003c11.1.0.0", "product_id": "T039663" } }, { "category": "product_version", "name": "11.1.0.0", "product": { "name": "Dell OpenManage Server Administrator 11.1.0.0", "product_id": "T039663-fixed", "product_identification_helper": { "cpe": "cpe:/a:dell:openmanage_server_administrator:11.1.0.0" } } } ], "category": "product_name", "name": "OpenManage Server Administrator" } ], "category": "vendor", "name": "Dell" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "IBM Integration Bus", "product": { "name": "IBM Integration Bus", "product_id": "T039654", "product_identification_helper": { "cpe": "cpe:/a:ibm:integration_bus:for_zos" } } }, { "category": "product_version", "name": "for zos 10.1-10.1.0.5", "product": { "name": "IBM Integration Bus for zos 10.1-10.1.0.5", "product_id": "T039901", "product_identification_helper": { "cpe": "cpe:/a:ibm:integration_bus:for_zos_10.1_-_10.1.0.5" } } } ], "category": "product_name", "name": "Integration Bus" }, { "branches": [ { "category": "product_version", "name": "v10", "product": { "name": "IBM Power Hardware Management Console v10", "product_id": "T023373", "product_identification_helper": { "cpe": "cpe:/a:ibm:hardware_management_console:v10" } } } ], "category": "product_name", "name": "Power Hardware Management Console" }, { "branches": [ { "category": "product_version_range", "name": "\u003c8.0.0.28", "product": { "name": "IBM Rational Build Forge \u003c8.0.0.28", "product_id": "T044783" } }, { "category": "product_version", "name": "8.0.0.28", "product": { "name": "IBM Rational Build Forge 8.0.0.28", "product_id": "T044783-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:rational_build_forge:8.0.0.28" } } } ], "category": "product_name", "name": "Rational Build Forge" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } }, { "branches": [ { "category": "product_name", "name": "SUSE openSUSE", "product": { "name": "SUSE openSUSE", "product_id": "T027843", "product_identification_helper": { "cpe": "cpe:/o:suse:opensuse:-" } } }, { "category": "product_name", "name": "SUSE openSUSE", "product": { "name": "SUSE openSUSE", "product_id": "T040043", "product_identification_helper": { "cpe": "cpe:/o:suse:opensuse:-" } } } ], "category": "product_name", "name": "openSUSE" } ], "category": "vendor", "name": "SUSE" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-52316", "product_status": { "known_affected": [ "67646", "T039901", "T004914", "T039663", "T039222", "T039654", "T040043", "T039221", "T039220", "2951", "T002207", "T027843", "398363", "T023373", "T044783" ] }, "release_date": "2024-11-17T23:00:00.000+00:00", "title": "CVE-2024-52316" }, { "cve": "CVE-2024-52317", "product_status": { "known_affected": [ "67646", "T039901", "T004914", "T039663", "T039222", "T039654", "T040043", "T039221", "T039220", "2951", "T002207", "T027843", "398363", "T023373", "T044783" ] }, "release_date": "2024-11-17T23:00:00.000+00:00", "title": "CVE-2024-52317" } ] }
wid-sec-w-2024-3684
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "IBM QRadar Security Information and Event Management (SIEM) bietet Unterst\u00fctzung bei der Erkennung und Priorisierung von Sicherheitsbedrohungen im Unternehmen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in IBM QRadar SIEM ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen offenzulegen oder einen Spoofing-Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-3684 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3684.json" }, { "category": "self", "summary": "WID-SEC-2024-3684 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3684" }, { "category": "external", "summary": "IBM Security Bulletin vom 2024-12-11", "url": "https://www.ibm.com/support/pages/node/7178556" } ], "source_lang": "en-US", "title": "IBM QRadar SIEM: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-12-11T23:00:00.000+00:00", "generator": { "date": "2024-12-12T09:36:59.736+00:00", "engine": { "name": "BSI-WID", "version": "1.3.10" } }, "id": "WID-SEC-W-2024-3684", "initial_release_date": "2024-12-11T23:00:00.000+00:00", "revision_history": [ { "date": "2024-12-11T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c7.5.0 UP10 IF02", "product": { "name": "IBM QRadar SIEM \u003c7.5.0 UP10 IF02", "product_id": "T039813" } }, { "category": "product_version", "name": "7.5.0 UP10 IF02", "product": { "name": "IBM QRadar SIEM 7.5.0 UP10 IF02", "product_id": "T039813-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up10_if02" } } } ], "category": "product_name", "name": "QRadar SIEM" } ], "category": "vendor", "name": "IBM" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-12900", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler existieren in mehreren Komponenten wie Google Guava, protobuf-java oder Netty, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer unkontrollierten Rekursion, einem stapelbasierten Puffer\u00fcberlauf oder einer unzul\u00e4ssigen Autorisierung und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen offenzulegen oder einen Spoofing-Angriff durchzuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T039813" ] }, "release_date": "2024-12-11T23:00:00.000+00:00", "title": "CVE-2019-12900" }, { "cve": "CVE-2020-8908", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler existieren in mehreren Komponenten wie Google Guava, protobuf-java oder Netty, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer unkontrollierten Rekursion, einem stapelbasierten Puffer\u00fcberlauf oder einer unzul\u00e4ssigen Autorisierung und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen offenzulegen oder einen Spoofing-Angriff durchzuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T039813" ] }, "release_date": "2024-12-11T23:00:00.000+00:00", "title": "CVE-2020-8908" }, { "cve": "CVE-2021-22569", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler existieren in mehreren Komponenten wie Google Guava, protobuf-java oder Netty, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer unkontrollierten Rekursion, einem stapelbasierten Puffer\u00fcberlauf oder einer unzul\u00e4ssigen Autorisierung und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen offenzulegen oder einen Spoofing-Angriff durchzuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T039813" ] }, "release_date": "2024-12-11T23:00:00.000+00:00", "title": "CVE-2021-22569" }, { "cve": "CVE-2022-3171", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler existieren in mehreren Komponenten wie Google Guava, protobuf-java oder Netty, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer unkontrollierten Rekursion, einem stapelbasierten Puffer\u00fcberlauf oder einer unzul\u00e4ssigen Autorisierung und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen offenzulegen oder einen Spoofing-Angriff durchzuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T039813" ] }, "release_date": "2024-12-11T23:00:00.000+00:00", "title": "CVE-2022-3171" }, { "cve": "CVE-2022-40152", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler existieren in mehreren Komponenten wie Google Guava, protobuf-java oder Netty, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer unkontrollierten Rekursion, einem stapelbasierten Puffer\u00fcberlauf oder einer unzul\u00e4ssigen Autorisierung und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen offenzulegen oder einen Spoofing-Angriff durchzuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T039813" ] }, "release_date": "2024-12-11T23:00:00.000+00:00", "title": "CVE-2022-40152" }, { "cve": "CVE-2022-41881", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler existieren in mehreren Komponenten wie Google Guava, protobuf-java oder Netty, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer unkontrollierten Rekursion, einem stapelbasierten Puffer\u00fcberlauf oder einer unzul\u00e4ssigen Autorisierung und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen offenzulegen oder einen Spoofing-Angriff durchzuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T039813" ] }, "release_date": "2024-12-11T23:00:00.000+00:00", "title": "CVE-2022-41881" }, { "cve": "CVE-2022-41915", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler existieren in mehreren Komponenten wie Google Guava, protobuf-java oder Netty, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer unkontrollierten Rekursion, einem stapelbasierten Puffer\u00fcberlauf oder einer unzul\u00e4ssigen Autorisierung und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen offenzulegen oder einen Spoofing-Angriff durchzuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T039813" ] }, "release_date": "2024-12-11T23:00:00.000+00:00", "title": "CVE-2022-41915" }, { "cve": "CVE-2023-2976", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler existieren in mehreren Komponenten wie Google Guava, protobuf-java oder Netty, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer unkontrollierten Rekursion, einem stapelbasierten Puffer\u00fcberlauf oder einer unzul\u00e4ssigen Autorisierung und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen offenzulegen oder einen Spoofing-Angriff durchzuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T039813" ] }, "release_date": "2024-12-11T23:00:00.000+00:00", "title": "CVE-2023-2976" }, { "cve": "CVE-2023-31582", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler existieren in mehreren Komponenten wie Google Guava, protobuf-java oder Netty, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer unkontrollierten Rekursion, einem stapelbasierten Puffer\u00fcberlauf oder einer unzul\u00e4ssigen Autorisierung und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen offenzulegen oder einen Spoofing-Angriff durchzuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T039813" ] }, "release_date": "2024-12-11T23:00:00.000+00:00", "title": "CVE-2023-31582" }, { "cve": "CVE-2023-33546", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler existieren in mehreren Komponenten wie Google Guava, protobuf-java oder Netty, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer unkontrollierten Rekursion, einem stapelbasierten Puffer\u00fcberlauf oder einer unzul\u00e4ssigen Autorisierung und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen offenzulegen oder einen Spoofing-Angriff durchzuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T039813" ] }, "release_date": "2024-12-11T23:00:00.000+00:00", "title": "CVE-2023-33546" }, { "cve": "CVE-2023-34453", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler existieren in mehreren Komponenten wie Google Guava, protobuf-java oder Netty, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer unkontrollierten Rekursion, einem stapelbasierten Puffer\u00fcberlauf oder einer unzul\u00e4ssigen Autorisierung und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen offenzulegen oder einen Spoofing-Angriff durchzuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T039813" ] }, "release_date": "2024-12-11T23:00:00.000+00:00", "title": "CVE-2023-34453" }, { "cve": "CVE-2023-34454", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler existieren in mehreren Komponenten wie Google Guava, protobuf-java oder Netty, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer unkontrollierten Rekursion, einem stapelbasierten Puffer\u00fcberlauf oder einer unzul\u00e4ssigen Autorisierung und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen offenzulegen oder einen Spoofing-Angriff durchzuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T039813" ] }, "release_date": "2024-12-11T23:00:00.000+00:00", "title": "CVE-2023-34454" }, { "cve": "CVE-2023-34455", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler existieren in mehreren Komponenten wie Google Guava, protobuf-java oder Netty, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer unkontrollierten Rekursion, einem stapelbasierten Puffer\u00fcberlauf oder einer unzul\u00e4ssigen Autorisierung und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen offenzulegen oder einen Spoofing-Angriff durchzuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T039813" ] }, "release_date": "2024-12-11T23:00:00.000+00:00", "title": "CVE-2023-34455" }, { "cve": "CVE-2023-34462", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler existieren in mehreren Komponenten wie Google Guava, protobuf-java oder Netty, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer unkontrollierten Rekursion, einem stapelbasierten Puffer\u00fcberlauf oder einer unzul\u00e4ssigen Autorisierung und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen offenzulegen oder einen Spoofing-Angriff durchzuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T039813" ] }, "release_date": "2024-12-11T23:00:00.000+00:00", "title": "CVE-2023-34462" }, { "cve": "CVE-2023-35116", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler existieren in mehreren Komponenten wie Google Guava, protobuf-java oder Netty, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer unkontrollierten Rekursion, einem stapelbasierten Puffer\u00fcberlauf oder einer unzul\u00e4ssigen Autorisierung und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen offenzulegen oder einen Spoofing-Angriff durchzuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T039813" ] }, "release_date": "2024-12-11T23:00:00.000+00:00", "title": "CVE-2023-35116" }, { "cve": "CVE-2023-36478", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler existieren in mehreren Komponenten wie Google Guava, protobuf-java oder Netty, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer unkontrollierten Rekursion, einem stapelbasierten Puffer\u00fcberlauf oder einer unzul\u00e4ssigen Autorisierung und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen offenzulegen oder einen Spoofing-Angriff durchzuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T039813" ] }, "release_date": "2024-12-11T23:00:00.000+00:00", "title": "CVE-2023-36478" }, { "cve": "CVE-2023-43642", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler existieren in mehreren Komponenten wie Google Guava, protobuf-java oder Netty, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer unkontrollierten Rekursion, einem stapelbasierten Puffer\u00fcberlauf oder einer unzul\u00e4ssigen Autorisierung und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen offenzulegen oder einen Spoofing-Angriff durchzuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T039813" ] }, "release_date": "2024-12-11T23:00:00.000+00:00", "title": "CVE-2023-43642" }, { "cve": "CVE-2023-44487", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler existieren in mehreren Komponenten wie Google Guava, protobuf-java oder Netty, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer unkontrollierten Rekursion, einem stapelbasierten Puffer\u00fcberlauf oder einer unzul\u00e4ssigen Autorisierung und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen offenzulegen oder einen Spoofing-Angriff durchzuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T039813" ] }, "release_date": "2024-12-11T23:00:00.000+00:00", "title": "CVE-2023-44487" }, { "cve": "CVE-2024-10041", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler existieren in mehreren Komponenten wie Google Guava, protobuf-java oder Netty, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer unkontrollierten Rekursion, einem stapelbasierten Puffer\u00fcberlauf oder einer unzul\u00e4ssigen Autorisierung und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen offenzulegen oder einen Spoofing-Angriff durchzuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T039813" ] }, "release_date": "2024-12-11T23:00:00.000+00:00", "title": "CVE-2024-10041" }, { "cve": "CVE-2024-10963", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler existieren in mehreren Komponenten wie Google Guava, protobuf-java oder Netty, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer unkontrollierten Rekursion, einem stapelbasierten Puffer\u00fcberlauf oder einer unzul\u00e4ssigen Autorisierung und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen offenzulegen oder einen Spoofing-Angriff durchzuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T039813" ] }, "release_date": "2024-12-11T23:00:00.000+00:00", "title": "CVE-2024-10963" }, { "cve": "CVE-2024-23454", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler existieren in mehreren Komponenten wie Google Guava, protobuf-java oder Netty, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer unkontrollierten Rekursion, einem stapelbasierten Puffer\u00fcberlauf oder einer unzul\u00e4ssigen Autorisierung und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen offenzulegen oder einen Spoofing-Angriff durchzuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T039813" ] }, "release_date": "2024-12-11T23:00:00.000+00:00", "title": "CVE-2024-23454" }, { "cve": "CVE-2024-3596", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler existieren in mehreren Komponenten wie Google Guava, protobuf-java oder Netty, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer unkontrollierten Rekursion, einem stapelbasierten Puffer\u00fcberlauf oder einer unzul\u00e4ssigen Autorisierung und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen offenzulegen oder einen Spoofing-Angriff durchzuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T039813" ] }, "release_date": "2024-12-11T23:00:00.000+00:00", "title": "CVE-2024-3596" }, { "cve": "CVE-2024-45491", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler existieren in mehreren Komponenten wie Google Guava, protobuf-java oder Netty, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer unkontrollierten Rekursion, einem stapelbasierten Puffer\u00fcberlauf oder einer unzul\u00e4ssigen Autorisierung und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen offenzulegen oder einen Spoofing-Angriff durchzuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T039813" ] }, "release_date": "2024-12-11T23:00:00.000+00:00", "title": "CVE-2024-45491" }, { "cve": "CVE-2024-51504", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler existieren in mehreren Komponenten wie Google Guava, protobuf-java oder Netty, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer unkontrollierten Rekursion, einem stapelbasierten Puffer\u00fcberlauf oder einer unzul\u00e4ssigen Autorisierung und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen offenzulegen oder einen Spoofing-Angriff durchzuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T039813" ] }, "release_date": "2024-12-11T23:00:00.000+00:00", "title": "CVE-2024-51504" }, { "cve": "CVE-2024-52316", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler existieren in mehreren Komponenten wie Google Guava, protobuf-java oder Netty, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer unkontrollierten Rekursion, einem stapelbasierten Puffer\u00fcberlauf oder einer unzul\u00e4ssigen Autorisierung und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen offenzulegen oder einen Spoofing-Angriff durchzuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T039813" ] }, "release_date": "2024-12-11T23:00:00.000+00:00", "title": "CVE-2024-52316" }, { "cve": "CVE-2024-52317", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler existieren in mehreren Komponenten wie Google Guava, protobuf-java oder Netty, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer unkontrollierten Rekursion, einem stapelbasierten Puffer\u00fcberlauf oder einer unzul\u00e4ssigen Autorisierung und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen offenzulegen oder einen Spoofing-Angriff durchzuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T039813" ] }, "release_date": "2024-12-11T23:00:00.000+00:00", "title": "CVE-2024-52317" }, { "cve": "CVE-2024-52318", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in IBM QRadar SIEM. Diese Fehler existieren in mehreren Komponenten wie Google Guava, protobuf-java oder Netty, unter anderem wegen mehrerer sicherheitsrelevanter Probleme wie einer unkontrollierten Rekursion, einem stapelbasierten Puffer\u00fcberlauf oder einer unzul\u00e4ssigen Autorisierung und mehr. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen offenzulegen oder einen Spoofing-Angriff durchzuf\u00fchren. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich." } ], "product_status": { "known_affected": [ "T039813" ] }, "release_date": "2024-12-11T23:00:00.000+00:00", "title": "CVE-2024-52318" } ] }
wid-sec-w-2025-0521
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "SAP stellt unternehmensweite L\u00f6sungen f\u00fcr Gesch\u00e4ftsprozesse wie Buchf\u00fchrung, Vertrieb, Einkauf und Lagerhaltung zur Verf\u00fcgung.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann diese Schwachstellen ausnutzen, um erh\u00f6hte Privilegien zu erlangen, beliebigen Code auszuf\u00fchren, Cross-Site-Scripting-Angriffe durchzuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen und Daten zu manipulieren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- Sonstiges\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2025-0521 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-0521.json" }, { "category": "self", "summary": "WID-SEC-2025-0521 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0521" }, { "category": "external", "summary": "SAP Security Patch Day - March 2025 vom 2025-03-10", "url": "https://support.sap.com/en/my-support/knowledge-base/security-notes-news/march-2025.html" } ], "source_lang": "en-US", "title": "SAP Patchday M\u00e4rz 2025: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-03-10T23:00:00.000+00:00", "generator": { "date": "2025-03-11T11:40:17.201+00:00", "engine": { "name": "BSI-WID", "version": "1.3.12" } }, "id": "WID-SEC-W-2025-0521", "initial_release_date": "2025-03-10T23:00:00.000+00:00", "revision_history": [ { "date": "2025-03-10T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "SAP Software", "product": { "name": "SAP Software", "product_id": "T041721", "product_identification_helper": { "cpe": "cpe:/a:sap:sap:-" } } } ], "category": "vendor", "name": "SAP" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38286", "product_status": { "known_affected": [ "T041721" ] }, "release_date": "2025-03-10T23:00:00.000+00:00", "title": "CVE-2024-38286" }, { "cve": "CVE-2024-38819", "product_status": { "known_affected": [ "T041721" ] }, "release_date": "2025-03-10T23:00:00.000+00:00", "title": "CVE-2024-38819" }, { "cve": "CVE-2024-38820", "product_status": { "known_affected": [ "T041721" ] }, "release_date": "2025-03-10T23:00:00.000+00:00", "title": "CVE-2024-38820" }, { "cve": "CVE-2024-39592", "product_status": { "known_affected": [ "T041721" ] }, "release_date": "2025-03-10T23:00:00.000+00:00", "title": "CVE-2024-39592" }, { "cve": "CVE-2024-41736", "product_status": { "known_affected": [ "T041721" ] }, "release_date": "2025-03-10T23:00:00.000+00:00", "title": "CVE-2024-41736" }, { "cve": "CVE-2024-52316", "product_status": { "known_affected": [ "T041721" ] }, "release_date": "2025-03-10T23:00:00.000+00:00", "title": "CVE-2024-52316" }, { "cve": "CVE-2025-0062", "product_status": { "known_affected": [ "T041721" ] }, "release_date": "2025-03-10T23:00:00.000+00:00", "title": "CVE-2025-0062" }, { "cve": "CVE-2025-0071", "product_status": { "known_affected": [ "T041721" ] }, "release_date": "2025-03-10T23:00:00.000+00:00", "title": "CVE-2025-0071" }, { "cve": "CVE-2025-23185", "product_status": { "known_affected": [ "T041721" ] }, "release_date": "2025-03-10T23:00:00.000+00:00", "title": "CVE-2025-23185" }, { "cve": "CVE-2025-23188", "product_status": { "known_affected": [ "T041721" ] }, "release_date": "2025-03-10T23:00:00.000+00:00", "title": "CVE-2025-23188" }, { "cve": "CVE-2025-23194", "product_status": { "known_affected": [ "T041721" ] }, "release_date": "2025-03-10T23:00:00.000+00:00", "title": "CVE-2025-23194" }, { "cve": "CVE-2025-24876", "product_status": { "known_affected": [ "T041721" ] }, "release_date": "2025-03-10T23:00:00.000+00:00", "title": "CVE-2025-24876" }, { "cve": "CVE-2025-25242", "product_status": { "known_affected": [ "T041721" ] }, "release_date": "2025-03-10T23:00:00.000+00:00", "title": "CVE-2025-25242" }, { "cve": "CVE-2025-25244", "product_status": { "known_affected": [ "T041721" ] }, "release_date": "2025-03-10T23:00:00.000+00:00", "title": "CVE-2025-25244" }, { "cve": "CVE-2025-25245", "product_status": { "known_affected": [ "T041721" ] }, "release_date": "2025-03-10T23:00:00.000+00:00", "title": "CVE-2025-25245" }, { "cve": "CVE-2025-26655", "product_status": { "known_affected": [ "T041721" ] }, "release_date": "2025-03-10T23:00:00.000+00:00", "title": "CVE-2025-26655" }, { "cve": "CVE-2025-26656", "product_status": { "known_affected": [ "T041721" ] }, "release_date": "2025-03-10T23:00:00.000+00:00", "title": "CVE-2025-26656" }, { "cve": "CVE-2025-26658", "product_status": { "known_affected": [ "T041721" ] }, "release_date": "2025-03-10T23:00:00.000+00:00", "title": "CVE-2025-26658" }, { "cve": "CVE-2025-26659", "product_status": { "known_affected": [ "T041721" ] }, "release_date": "2025-03-10T23:00:00.000+00:00", "title": "CVE-2025-26659" }, { "cve": "CVE-2025-26660", "product_status": { "known_affected": [ "T041721" ] }, "release_date": "2025-03-10T23:00:00.000+00:00", "title": "CVE-2025-26660" }, { "cve": "CVE-2025-26661", "product_status": { "known_affected": [ "T041721" ] }, "release_date": "2025-03-10T23:00:00.000+00:00", "title": "CVE-2025-26661" }, { "cve": "CVE-2025-27430", "product_status": { "known_affected": [ "T041721" ] }, "release_date": "2025-03-10T23:00:00.000+00:00", "title": "CVE-2025-27430" }, { "cve": "CVE-2025-27431", "product_status": { "known_affected": [ "T041721" ] }, "release_date": "2025-03-10T23:00:00.000+00:00", "title": "CVE-2025-27431" }, { "cve": "CVE-2025-27432", "product_status": { "known_affected": [ "T041721" ] }, "release_date": "2025-03-10T23:00:00.000+00:00", "title": "CVE-2025-27432" }, { "cve": "CVE-2025-27433", "product_status": { "known_affected": [ "T041721" ] }, "release_date": "2025-03-10T23:00:00.000+00:00", "title": "CVE-2025-27433" }, { "cve": "CVE-2025-27434", "product_status": { "known_affected": [ "T041721" ] }, "release_date": "2025-03-10T23:00:00.000+00:00", "title": "CVE-2025-27434" }, { "cve": "CVE-2025-27436", "product_status": { "known_affected": [ "T041721" ] }, "release_date": "2025-03-10T23:00:00.000+00:00", "title": "CVE-2025-27436" } ] }
ncsc-2025-0020
Vulnerability from csaf_ncscnl
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Oracle heeft kwetsbaarheden verholpen in diverse database producten en subsystemen, zoals de Core Database, Graal, Application Express, GoldenGate en REST data.", "title": "Feiten" }, { "category": "description", "text": "De kwetsbaarheden bevinden zich in verschillende componenten van de Oracle Database, waaronder de Data Mining component en de Java VM. Deze kwetsbaarheden stellen laaggeprivilegieerde geauthenticeerde gebruikers in staat om het systeem te compromitteren, wat kan leiden tot ongeautoriseerde toegang en gegevensmanipulatie. De Java VM-kwetsbaarheid kan ook leiden tot ongeautoriseerde wijzigingen van gegevens.", "title": "Interpretaties" }, { "category": "description", "text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Unchecked Error Condition", "title": "CWE-391" }, { "category": "general", "text": "Misinterpretation of Input", "title": "CWE-115" }, { "category": "general", "text": "Return of Pointer Value Outside of Expected Range", "title": "CWE-466" }, { "category": "general", "text": "Truncation of Security-relevant Information", "title": "CWE-222" }, { "category": "general", "text": "Incorrect Calculation of Buffer Size", "title": "CWE-131" }, { "category": "general", "text": "Improper Validation of Specified Type of Input", "title": "CWE-1287" }, { "category": "general", "text": "Insecure Storage of Sensitive Information", "title": "CWE-922" }, { "category": "general", "text": "Integer Underflow (Wrap or Wraparound)", "title": "CWE-191" }, { "category": "general", "text": "Insufficient Granularity of Access Control", "title": "CWE-1220" }, { "category": "general", "text": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)", "title": "CWE-776" }, { "category": "general", "text": "Improper Handling of Case Sensitivity", "title": "CWE-178" }, { "category": "general", "text": "Time-of-check Time-of-use (TOCTOU) Race Condition", "title": "CWE-367" }, { "category": "general", "text": "Expected Behavior Violation", "title": "CWE-440" }, { "category": "general", "text": "Improper Validation of Syntactic Correctness of Input", "title": "CWE-1286" }, { "category": "general", "text": "Improper Check or Handling of Exceptional Conditions", "title": "CWE-703" }, { "category": "general", "text": "Reachable Assertion", "title": "CWE-617" }, { "category": "general", "text": "Uncontrolled Search Path Element", "title": "CWE-427" }, { "category": "general", "text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)", "title": "CWE-601" }, { "category": "general", "text": "Authentication Bypass Using an Alternate Path or Channel", "title": "CWE-288" }, { "category": "general", "text": "Improper Validation of Integrity Check Value", "title": "CWE-354" }, { "category": "general", "text": "Integer Overflow or Wraparound", "title": "CWE-190" }, { "category": "general", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "general", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "general", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" }, { "category": "general", "text": "Inefficient Regular Expression Complexity", "title": "CWE-1333" }, { "category": "general", "text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)", "title": "CWE-1321" }, { "category": "general", "text": "NULL Pointer Dereference", "title": "CWE-476" }, { "category": "general", "text": "Selection of Less-Secure Algorithm During Negotiation (\u0027Algorithm Downgrade\u0027)", "title": "CWE-757" }, { "category": "general", "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)", "title": "CWE-94" }, { "category": "general", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "general", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" }, { "category": "general", "text": "Deserialization of Untrusted Data", "title": "CWE-502" }, { "category": "general", "text": "Uncontrolled Recursion", "title": "CWE-674" }, { "category": "general", "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "title": "CWE-22" }, { "category": "general", "text": "Improper Restriction of XML External Entity Reference", "title": "CWE-611" }, { "category": "general", "text": "Out-of-bounds Write", "title": "CWE-787" }, { "category": "general", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "general", "text": "Heap-based Buffer Overflow", "title": "CWE-122" }, { "category": "general", "text": "Stack-based Buffer Overflow", "title": "CWE-121" }, { "category": "general", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" }, { "category": "general", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "general", "text": "Incorrect Default Permissions", "title": "CWE-276" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Reference - cveprojectv5; nvd; oracle", "url": "https://www.oracle.com/security-alerts/cpujan2025.html" } ], "title": "Kwetsbaarheden verholpen in Oracle Database producten", "tracking": { "current_release_date": "2025-01-22T13:30:16.354373Z", "id": "NCSC-2025-0020", "initial_release_date": "2025-01-22T13:30:16.354373Z", "revision_history": [ { "date": "2025-01-22T13:30:16.354373Z", "number": "0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "graal_development_kit_for_micronaut", "product": { "name": "graal_development_kit_for_micronaut", "product_id": "CSAFPID-1751216", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:graal_development_kit_for_micronaut:23.5-23.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_data_mining", "product": { "name": "database_-_data_mining", "product_id": "CSAFPID-1751200", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_data_mining:19.3-19.25:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_data_mining", "product": { "name": "database_-_data_mining", "product_id": "CSAFPID-1751199", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_data_mining:21.3-21.16:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_migration_assistant_for_unicode", "product": { "name": "database_migration_assistant_for_unicode", "product_id": "CSAFPID-1751212", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_migration_assistant_for_unicode:19.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_server", "product": { "name": "database_server", "product_id": "CSAFPID-1503604", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_server:_java_vm___23.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_graalvm_multilingual_engine", "product": { "name": "database_-_graalvm_multilingual_engine", "product_id": "CSAFPID-1751223", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_graalvm_multilingual_engine:21.4-21.16:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "database_-_graalvm_multilingual_engine", "product": { "name": "database_-_graalvm_multilingual_engine", "product_id": "CSAFPID-1751224", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:database_-_graalvm_multilingual_engine:23.5-23.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "application_express", "product": { "name": "application_express", "product_id": "CSAFPID-1503575", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:application_express:23.2:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "application_express", "product": { "name": "application_express", "product_id": "CSAFPID-1673188", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:application_express:24.1:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-342816", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_big_data_and_application_adapters", "product": { "name": "goldengate_big_data_and_application_adapters", "product_id": "CSAFPID-816845", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_big_data_and_application_adapters", "product": { "name": "goldengate_big_data_and_application_adapters", "product_id": "CSAFPID-1650825", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:19.1.0.0.0-19.1.0.0.18:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_big_data_and_application_adapters", "product": { "name": "goldengate_big_data_and_application_adapters", "product_id": "CSAFPID-1751298", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:21.3.0.0.0-21.16.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate_big_data_and_application_adapters", "product": { "name": "goldengate_big_data_and_application_adapters", "product_id": "CSAFPID-1751299", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:23.4-23.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-1650767", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:19.1.0.0.0-19.23.0.0.240716:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-485902", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:19.1.0.0.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-1503736", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:19.23.0.0.240716:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-1503739", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:21.14:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-1751093", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:21.16:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-1751094", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:23.4:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-1751095", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:23.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-1751204", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:23.4-23.6:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-1503738", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:21.3:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-1751203", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:21.3-21.16:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "goldengate", "product": { "name": "goldengate", "product_id": "CSAFPID-1650765", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:goldengate:21.3-21.14:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "rest_data_services", "product": { "name": "rest_data_services", "product_id": "CSAFPID-711746", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:rest_data_services:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "rest_data_services", "product": { "name": "rest_data_services", "product_id": "CSAFPID-1751305", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:rest_data_services:24.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "rest_data_services", "product": { "name": "rest_data_services", "product_id": "CSAFPID-1751304", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:rest_data_services:24.3.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_backup", "product": { "name": "secure_backup", "product_id": "CSAFPID-667692", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:secure_backup:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_backup", "product": { "name": "secure_backup", "product_id": "CSAFPID-345049", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:secure_backup:18.1.0.1.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_backup", "product": { "name": "secure_backup", "product_id": "CSAFPID-611417", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:secure_backup:18.1.0.2.0:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "secure_backup", "product": { "name": "secure_backup", "product_id": "CSAFPID-1673422", "product_identification_helper": { "cpe": "cpe:2.3:a:oracle:secure_backup:19.1.0.0.0:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-38998", "cwe": { "id": "CWE-1321", "name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)" }, "notes": [ { "category": "other", "text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)", "title": "CWE-1321" } ], "product_status": { "known_affected": [ "CSAFPID-1503575", "CSAFPID-1673188", "CSAFPID-1751204", "CSAFPID-1751203" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38998", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38998.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1503575", "CSAFPID-1673188", "CSAFPID-1751204", "CSAFPID-1751203" ] } ], "title": "CVE-2024-38998" }, { "cve": "CVE-2024-38999", "cwe": { "id": "CWE-1321", "name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)" }, "notes": [ { "category": "other", "text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)", "title": "CWE-1321" } ], "product_status": { "known_affected": [ "CSAFPID-1503575", "CSAFPID-1673188", "CSAFPID-1751204", "CSAFPID-1751203" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38999", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38999.json" } ], "scores": [ { "cvss_v3": { "baseScore": 10.0, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1503575", "CSAFPID-1673188", "CSAFPID-1751204", "CSAFPID-1751203" ] } ], "title": "CVE-2024-38999" }, { "cve": "CVE-2024-45490", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" }, { "category": "other", "text": "Incorrect Calculation of Buffer Size", "title": "CWE-131" }, { "category": "other", "text": "Improper Restriction of XML External Entity Reference", "title": "CWE-611" } ], "references": [ { "category": "self", "summary": "CVE-2024-45490", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45490.json" } ], "title": "CVE-2024-45490" }, { "cve": "CVE-2024-45491", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" } ], "references": [ { "category": "self", "summary": "CVE-2024-45491", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45491.json" } ], "title": "CVE-2024-45491" }, { "cve": "CVE-2024-45492", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" } ], "references": [ { "category": "self", "summary": "CVE-2024-45492", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45492.json" } ], "title": "CVE-2024-45492" }, { "cve": "CVE-2024-45772", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "notes": [ { "category": "other", "text": "Deserialization of Untrusted Data", "title": "CWE-502" } ], "references": [ { "category": "self", "summary": "CVE-2024-45772", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45772.json" } ], "title": "CVE-2024-45772" }, { "cve": "CVE-2024-47554", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "references": [ { "category": "self", "summary": "CVE-2024-47554", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47554.json" } ], "title": "CVE-2024-47554" }, { "cve": "CVE-2024-47561", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "notes": [ { "category": "other", "text": "Deserialization of Untrusted Data", "title": "CWE-502" } ], "product_status": { "known_affected": [ "CSAFPID-1650825", "CSAFPID-1751298", "CSAFPID-1751299" ] }, "references": [ { "category": "self", "summary": "CVE-2024-47561", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47561.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1650825", "CSAFPID-1751298", "CSAFPID-1751299" ] } ], "title": "CVE-2024-47561" }, { "cve": "CVE-2024-50379", "cwe": { "id": "CWE-367", "name": "Time-of-check Time-of-use (TOCTOU) Race Condition" }, "notes": [ { "category": "other", "text": "Time-of-check Time-of-use (TOCTOU) Race Condition", "title": "CWE-367" } ], "references": [ { "category": "self", "summary": "CVE-2024-50379", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50379.json" } ], "title": "CVE-2024-50379" }, { "cve": "CVE-2024-52316", "cwe": { "id": "CWE-391", "name": "Unchecked Error Condition" }, "notes": [ { "category": "other", "text": "Unchecked Error Condition", "title": "CWE-391" }, { "category": "other", "text": "Authentication Bypass Using an Alternate Path or Channel", "title": "CWE-288" } ], "references": [ { "category": "self", "summary": "CVE-2024-52316", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-52316.json" } ], "title": "CVE-2024-52316" }, { "cve": "CVE-2024-54677", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "references": [ { "category": "self", "summary": "CVE-2024-54677", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-54677.json" } ], "title": "CVE-2024-54677" }, { "cve": "CVE-2024-56337", "cwe": { "id": "CWE-367", "name": "Time-of-check Time-of-use (TOCTOU) Race Condition" }, "notes": [ { "category": "other", "text": "Time-of-check Time-of-use (TOCTOU) Race Condition", "title": "CWE-367" } ], "references": [ { "category": "self", "summary": "CVE-2024-56337", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-56337.json" } ], "title": "CVE-2024-56337" }, { "cve": "CVE-2025-21553", "references": [ { "category": "self", "summary": "CVE-2025-21553", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21553.json" } ], "title": "CVE-2025-21553" }, { "cve": "CVE-2025-21557", "product_status": { "known_affected": [ "CSAFPID-1503575", "CSAFPID-1673188" ] }, "references": [ { "category": "self", "summary": "CVE-2025-21557", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21557.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1503575", "CSAFPID-1673188" ] } ], "title": "CVE-2025-21557" }, { "cve": "CVE-2022-26345", "cwe": { "id": "CWE-427", "name": "Uncontrolled Search Path Element" }, "notes": [ { "category": "other", "text": "Uncontrolled Search Path Element", "title": "CWE-427" } ], "product_status": { "known_affected": [ "CSAFPID-1751199", "CSAFPID-1751200" ] }, "references": [ { "category": "self", "summary": "CVE-2022-26345", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-26345.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1751199", "CSAFPID-1751200" ] } ], "title": "CVE-2022-26345" }, { "cve": "CVE-2023-27043", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "references": [ { "category": "self", "summary": "CVE-2023-27043", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-27043.json" } ], "title": "CVE-2023-27043" }, { "cve": "CVE-2023-36730", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1751203", "CSAFPID-1751204" ] }, "references": [ { "category": "self", "summary": "CVE-2023-36730", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-36730.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1751203", "CSAFPID-1751204" ] } ], "title": "CVE-2023-36730" }, { "cve": "CVE-2023-36785", "cwe": { "id": "CWE-191", "name": "Integer Underflow (Wrap or Wraparound)" }, "notes": [ { "category": "other", "text": "Integer Underflow (Wrap or Wraparound)", "title": "CWE-191" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1751203", "CSAFPID-1751204" ] }, "references": [ { "category": "self", "summary": "CVE-2023-36785", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-36785.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1751203", "CSAFPID-1751204" ] } ], "title": "CVE-2023-36785" }, { "cve": "CVE-2023-48795", "cwe": { "id": "CWE-222", "name": "Truncation of Security-relevant Information" }, "notes": [ { "category": "other", "text": "Truncation of Security-relevant Information", "title": "CWE-222" }, { "category": "other", "text": "Selection of Less-Secure Algorithm During Negotiation (\u0027Algorithm Downgrade\u0027)", "title": "CWE-757" }, { "category": "other", "text": "Improper Validation of Integrity Check Value", "title": "CWE-354" } ], "product_status": { "known_affected": [ "CSAFPID-1650765", "CSAFPID-1650767", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-711746", "CSAFPID-816845", "CSAFPID-1503575", "CSAFPID-1503604", "CSAFPID-1751212" ] }, "references": [ { "category": "self", "summary": "CVE-2023-48795", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-48795.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1650765", "CSAFPID-1650767", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-711746", "CSAFPID-816845", "CSAFPID-1503575", "CSAFPID-1503604", "CSAFPID-1751212" ] } ], "title": "CVE-2023-48795" }, { "cve": "CVE-2023-52428", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-342816", "CSAFPID-1503575", "CSAFPID-1503604", "CSAFPID-816845", "CSAFPID-711746", "CSAFPID-1751216" ] }, "references": [ { "category": "self", "summary": "CVE-2023-52428", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52428.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-342816", "CSAFPID-1503575", "CSAFPID-1503604", "CSAFPID-816845", "CSAFPID-711746", "CSAFPID-1751216" ] } ], "title": "CVE-2023-52428" }, { "cve": "CVE-2024-2961", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-1503575", "CSAFPID-1503604", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-711746" ] }, "references": [ { "category": "self", "summary": "CVE-2024-2961", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2961.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1503575", "CSAFPID-1503604", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-711746" ] } ], "title": "CVE-2024-2961" }, { "cve": "CVE-2024-4030", "cwe": { "id": "CWE-276", "name": "Incorrect Default Permissions" }, "notes": [ { "category": "other", "text": "Incorrect Default Permissions", "title": "CWE-276" } ], "references": [ { "category": "self", "summary": "CVE-2024-4030", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4030.json" } ], "title": "CVE-2024-4030" }, { "cve": "CVE-2024-4032", "cwe": { "id": "CWE-440", "name": "Expected Behavior Violation" }, "notes": [ { "category": "other", "text": "Expected Behavior Violation", "title": "CWE-440" } ], "references": [ { "category": "self", "summary": "CVE-2024-4032", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4032.json" } ], "title": "CVE-2024-4032" }, { "cve": "CVE-2024-6232", "cwe": { "id": "CWE-1333", "name": "Inefficient Regular Expression Complexity" }, "notes": [ { "category": "other", "text": "Inefficient Regular Expression Complexity", "title": "CWE-1333" } ], "references": [ { "category": "self", "summary": "CVE-2024-6232", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6232.json" } ], "title": "CVE-2024-6232" }, { "cve": "CVE-2024-6763", "cwe": { "id": "CWE-1286", "name": "Improper Validation of Syntactic Correctness of Input" }, "notes": [ { "category": "other", "text": "Improper Validation of Syntactic Correctness of Input", "title": "CWE-1286" } ], "product_status": { "known_affected": [ "CSAFPID-1751304", "CSAFPID-1751305" ] }, "references": [ { "category": "self", "summary": "CVE-2024-6763", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6763.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1751304", "CSAFPID-1751305" ] } ], "title": "CVE-2024-6763" }, { "cve": "CVE-2024-6923", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "notes": [ { "category": "other", "text": "Deserialization of Untrusted Data", "title": "CWE-502" }, { "category": "other", "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)", "title": "CWE-94" } ], "references": [ { "category": "self", "summary": "CVE-2024-6923", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6923.json" } ], "title": "CVE-2024-6923" }, { "cve": "CVE-2024-7254", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "Uncontrolled Recursion", "title": "CWE-674" } ], "references": [ { "category": "self", "summary": "CVE-2024-7254", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7254.json" } ], "title": "CVE-2024-7254" }, { "cve": "CVE-2024-7592", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "references": [ { "category": "self", "summary": "CVE-2024-7592", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7592.json" } ], "title": "CVE-2024-7592" }, { "cve": "CVE-2024-8088", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "other", "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "title": "CWE-835" } ], "references": [ { "category": "self", "summary": "CVE-2024-8088", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-8088.json" } ], "title": "CVE-2024-8088" }, { "cve": "CVE-2024-8927", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "other", "text": "Insufficient Granularity of Access Control", "title": "CWE-1220" } ], "product_status": { "known_affected": [ "CSAFPID-1673422", "CSAFPID-345049", "CSAFPID-611417" ] }, "references": [ { "category": "self", "summary": "CVE-2024-8927", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-8927.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1673422", "CSAFPID-345049", "CSAFPID-611417" ] } ], "title": "CVE-2024-8927" }, { "cve": "CVE-2024-11053", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "references": [ { "category": "self", "summary": "CVE-2024-11053", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-11053.json" } ], "title": "CVE-2024-11053" }, { "cve": "CVE-2024-21211", "cwe": { "id": "CWE-922", "name": "Insecure Storage of Sensitive Information" }, "notes": [ { "category": "other", "text": "Insecure Storage of Sensitive Information", "title": "CWE-922" } ], "product_status": { "known_affected": [ "CSAFPID-1751223", "CSAFPID-1751224" ] }, "references": [ { "category": "self", "summary": "CVE-2024-21211", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21211.json" } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1751223", "CSAFPID-1751224" ] } ], "title": "CVE-2024-21211" }, { "cve": "CVE-2024-22262", "cwe": { "id": "CWE-601", "name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)" }, "notes": [ { "category": "other", "text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)", "title": "CWE-601" } ], "product_status": { "known_affected": [ "CSAFPID-1650825", "CSAFPID-1503575", "CSAFPID-1503604", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-711746" ] }, "references": [ { "category": "self", "summary": "CVE-2024-22262", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22262.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1650825", "CSAFPID-1503575", "CSAFPID-1503604", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-711746" ] } ], "title": "CVE-2024-22262" }, { "cve": "CVE-2024-24789", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "other", "text": "Improper Validation of Specified Type of Input", "title": "CWE-1287" } ], "references": [ { "category": "self", "summary": "CVE-2024-24789", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24789.json" } ], "title": "CVE-2024-24789" }, { "cve": "CVE-2024-24790", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "other", "text": "Misinterpretation of Input", "title": "CWE-115" }, { "category": "other", "text": "Improper Validation of Specified Type of Input", "title": "CWE-1287" } ], "references": [ { "category": "self", "summary": "CVE-2024-24790", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24790.json" } ], "title": "CVE-2024-24790" }, { "cve": "CVE-2024-24791", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "references": [ { "category": "self", "summary": "CVE-2024-24791", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24791.json" } ], "title": "CVE-2024-24791" }, { "cve": "CVE-2024-28757", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "notes": [ { "category": "other", "text": "Improper Restriction of XML External Entity Reference", "title": "CWE-611" }, { "category": "other", "text": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)", "title": "CWE-776" }, { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1503575", "CSAFPID-1503604", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-711746" ] }, "references": [ { "category": "self", "summary": "CVE-2024-28757", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28757.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1503575", "CSAFPID-1503604", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-711746" ] } ], "title": "CVE-2024-28757" }, { "cve": "CVE-2024-33599", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "other", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" }, { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" } ], "references": [ { "category": "self", "summary": "CVE-2024-33599", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33599.json" } ], "title": "CVE-2024-33599" }, { "cve": "CVE-2024-33600", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "references": [ { "category": "self", "summary": "CVE-2024-33600", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33600.json" } ], "title": "CVE-2024-33600" }, { "cve": "CVE-2024-33601", "cwe": { "id": "CWE-703", "name": "Improper Check or Handling of Exceptional Conditions" }, "notes": [ { "category": "other", "text": "Improper Check or Handling of Exceptional Conditions", "title": "CWE-703" }, { "category": "other", "text": "Reachable Assertion", "title": "CWE-617" } ], "references": [ { "category": "self", "summary": "CVE-2024-33601", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33601.json" } ], "title": "CVE-2024-33601" }, { "cve": "CVE-2024-33602", "cwe": { "id": "CWE-466", "name": "Return of Pointer Value Outside of Expected Range" }, "notes": [ { "category": "other", "text": "Return of Pointer Value Outside of Expected Range", "title": "CWE-466" }, { "category": "other", "text": "Improper Check or Handling of Exceptional Conditions", "title": "CWE-703" } ], "references": [ { "category": "self", "summary": "CVE-2024-33602", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33602.json" } ], "title": "CVE-2024-33602" }, { "cve": "CVE-2024-38819", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "other", "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "title": "CWE-22" } ], "product_status": { "known_affected": [ "CSAFPID-1650825" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38819", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38819.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1650825" ] } ], "title": "CVE-2024-38819" }, { "cve": "CVE-2024-38820", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "other", "text": "Improper Handling of Case Sensitivity", "title": "CWE-178" } ], "product_status": { "known_affected": [ "CSAFPID-1650825" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38820", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38820.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1650825" ] } ], "title": "CVE-2024-38820" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.