<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">tomcat-8.0.36-3.3 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:10446</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-17T21:45:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-17T21:45:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-17T21:45:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">tomcat-8.0.36-3.3 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the tomcat-8.0.36-3.3 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-10446</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL/>
      <Description>E-Mail link for openSUSE-SU-2024:10446</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-1976/</URL>
      <Description>SUSE CVE CVE-2013-1976 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-0050/</URL>
      <Description>SUSE CVE CVE-2014-0050 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-5174/</URL>
      <Description>SUSE CVE CVE-2015-5174 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-5345/</URL>
      <Description>SUSE CVE CVE-2015-5345 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-5346/</URL>
      <Description>SUSE CVE CVE-2015-5346 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-5351/</URL>
      <Description>SUSE CVE CVE-2015-5351 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0706/</URL>
      <Description>SUSE CVE CVE-2016-0706 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0714/</URL>
      <Description>SUSE CVE CVE-2016-0714 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0763/</URL>
      <Description>SUSE CVE CVE-2016-0763 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-3092/</URL>
      <Description>SUSE CVE CVE-2016-3092 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="tomcat-8.0.36-3.3">
      <FullProductName ProductID="tomcat-8.0.36-3.3">tomcat-8.0.36-3.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tomcat-admin-webapps-8.0.36-3.3">
      <FullProductName ProductID="tomcat-admin-webapps-8.0.36-3.3">tomcat-admin-webapps-8.0.36-3.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tomcat-docs-webapp-8.0.36-3.3">
      <FullProductName ProductID="tomcat-docs-webapp-8.0.36-3.3">tomcat-docs-webapp-8.0.36-3.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tomcat-el-3_0-api-8.0.36-3.3">
      <FullProductName ProductID="tomcat-el-3_0-api-8.0.36-3.3">tomcat-el-3_0-api-8.0.36-3.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tomcat-embed-8.0.36-3.3">
      <FullProductName ProductID="tomcat-embed-8.0.36-3.3">tomcat-embed-8.0.36-3.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tomcat-javadoc-8.0.36-3.3">
      <FullProductName ProductID="tomcat-javadoc-8.0.36-3.3">tomcat-javadoc-8.0.36-3.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tomcat-jsp-2_3-api-8.0.36-3.3">
      <FullProductName ProductID="tomcat-jsp-2_3-api-8.0.36-3.3">tomcat-jsp-2_3-api-8.0.36-3.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tomcat-jsvc-8.0.36-3.3">
      <FullProductName ProductID="tomcat-jsvc-8.0.36-3.3">tomcat-jsvc-8.0.36-3.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tomcat-lib-8.0.36-3.3">
      <FullProductName ProductID="tomcat-lib-8.0.36-3.3">tomcat-lib-8.0.36-3.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tomcat-servlet-3_1-api-8.0.36-3.3">
      <FullProductName ProductID="tomcat-servlet-3_1-api-8.0.36-3.3">tomcat-servlet-3_1-api-8.0.36-3.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tomcat-webapps-8.0.36-3.3">
      <FullProductName ProductID="tomcat-webapps-8.0.36-3.3">tomcat-webapps-8.0.36-3.3</FullProductName>
    </Branch>
    <Relationship ProductReference="tomcat-8.0.36-3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:tomcat-8.0.36-3.3">tomcat-8.0.36-3.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat-admin-webapps-8.0.36-3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:tomcat-admin-webapps-8.0.36-3.3">tomcat-admin-webapps-8.0.36-3.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat-docs-webapp-8.0.36-3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:tomcat-docs-webapp-8.0.36-3.3">tomcat-docs-webapp-8.0.36-3.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat-el-3_0-api-8.0.36-3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:tomcat-el-3_0-api-8.0.36-3.3">tomcat-el-3_0-api-8.0.36-3.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat-embed-8.0.36-3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:tomcat-embed-8.0.36-3.3">tomcat-embed-8.0.36-3.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat-javadoc-8.0.36-3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:tomcat-javadoc-8.0.36-3.3">tomcat-javadoc-8.0.36-3.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat-jsp-2_3-api-8.0.36-3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:tomcat-jsp-2_3-api-8.0.36-3.3">tomcat-jsp-2_3-api-8.0.36-3.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat-jsvc-8.0.36-3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:tomcat-jsvc-8.0.36-3.3">tomcat-jsvc-8.0.36-3.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat-lib-8.0.36-3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:tomcat-lib-8.0.36-3.3">tomcat-lib-8.0.36-3.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat-servlet-3_1-api-8.0.36-3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:tomcat-servlet-3_1-api-8.0.36-3.3">tomcat-servlet-3_1-api-8.0.36-3.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat-webapps-8.0.36-3.3" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:tomcat-webapps-8.0.36-3.3">tomcat-webapps-8.0.36-3.3 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The (1) tomcat5, (2) tomcat6, and (3) tomcat7 init scripts, as used in the RPM distribution of Tomcat for JBoss Enterprise Web Server 1.0.2 and 2.0.0, and Red Hat Enterprise Linux 5 and 6, allow local users to change the ownership of arbitrary files via a symlink attack on (a) tomcat5-initd.log, (b) tomcat6-initd.log, (c) catalina.out, or (d) tomcat7-initd.log.</Note>
    </Notes>
    <CVE>CVE-2013-1976</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tomcat-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-admin-webapps-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-docs-webapp-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-el-3_0-api-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-embed-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-javadoc-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-jsp-2_3-api-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-jsvc-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-lib-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-servlet-3_1-api-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-webapps-8.0.36-3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-1976.html</URL>
        <Description>CVE-2013-1976</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/822177</URL>
        <Description>SUSE Bug 822177</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">MultipartStream.java in Apache Commons FileUpload before 1.3.1, as used in Apache Tomcat, JBoss Web, and other products, allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted Content-Type header that bypasses a loop's intended exit conditions.</Note>
    </Notes>
    <CVE>CVE-2014-0050</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tomcat-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-admin-webapps-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-docs-webapp-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-el-3_0-api-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-embed-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-javadoc-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-jsp-2_3-api-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-jsvc-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-lib-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-servlet-3_1-api-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-webapps-8.0.36-3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-0050.html</URL>
        <Description>CVE-2014-0050</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/862781</URL>
        <Description>SUSE Bug 862781</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Directory traversal vulnerability in RequestUtil.java in Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.65, and 8.x before 8.0.27 allows remote authenticated users to bypass intended SecurityManager restrictions and list a parent directory via a /.. (slash dot dot) in a pathname used by a web application in a getResource, getResourceAsStream, or getResourcePaths call, as demonstrated by the $CATALINA_BASE/webapps directory.</Note>
    </Notes>
    <CVE>CVE-2015-5174</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tomcat-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-admin-webapps-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-docs-webapp-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-el-3_0-api-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-embed-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-javadoc-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-jsp-2_3-api-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-jsvc-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-lib-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-servlet-3_1-api-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-webapps-8.0.36-3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:A/AC:M/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-5174.html</URL>
        <Description>CVE-2015-5174</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/967967</URL>
        <Description>SUSE Bug 967967</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Mapper component in Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.68, 8.x before 8.0.30, and 9.x before 9.0.0.M2 processes redirects before considering security constraints and Filters, which allows remote attackers to determine the existence of a directory via a URL that lacks a trailing / (slash) character.</Note>
    </Notes>
    <CVE>CVE-2015-5345</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tomcat-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-admin-webapps-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-docs-webapp-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-el-3_0-api-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-embed-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-javadoc-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-jsp-2_3-api-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-jsvc-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-lib-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-servlet-3_1-api-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-webapps-8.0.36-3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-5345.html</URL>
        <Description>CVE-2015-5345</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/967965</URL>
        <Description>SUSE Bug 967965</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Session fixation vulnerability in Apache Tomcat 7.x before 7.0.66, 8.x before 8.0.30, and 9.x before 9.0.0.M2, when different session settings are used for deployments of multiple versions of the same web application, might allow remote attackers to hijack web sessions by leveraging use of a requestedSessionSSL field for an unintended request, related to CoyoteAdapter.java and Request.java.</Note>
    </Notes>
    <CVE>CVE-2015-5346</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tomcat-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-admin-webapps-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-docs-webapp-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-el-3_0-api-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-embed-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-javadoc-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-jsp-2_3-api-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-jsvc-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-lib-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-servlet-3_1-api-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-webapps-8.0.36-3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.4</BaseScore>
        <Vector>AV:A/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-5346.html</URL>
        <Description>CVE-2015-5346</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/967814</URL>
        <Description>SUSE Bug 967814</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The (1) Manager and (2) Host Manager applications in Apache Tomcat 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 establish sessions and send CSRF tokens for arbitrary new requests, which allows remote attackers to bypass a CSRF protection mechanism by using a token.</Note>
    </Notes>
    <CVE>CVE-2015-5351</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tomcat-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-admin-webapps-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-docs-webapp-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-el-3_0-api-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-embed-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-javadoc-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-jsp-2_3-api-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-jsvc-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-lib-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-servlet-3_1-api-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-webapps-8.0.36-3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.4</BaseScore>
        <Vector>AV:A/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-5351.html</URL>
        <Description>CVE-2015-5351</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/967812</URL>
        <Description>SUSE Bug 967812</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 does not place org.apache.catalina.manager.StatusManagerServlet on the org/apache/catalina/core/RestrictedServlets.properties list, which allows remote authenticated users to bypass intended SecurityManager restrictions and read arbitrary HTTP requests, and consequently discover session ID values, via a crafted web application.</Note>
    </Notes>
    <CVE>CVE-2016-0706</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tomcat-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-admin-webapps-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-docs-webapp-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-el-3_0-api-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-embed-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-javadoc-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-jsp-2_3-api-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-jsvc-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-lib-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-servlet-3_1-api-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-webapps-8.0.36-3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0706.html</URL>
        <Description>CVE-2016-0706</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/967815</URL>
        <Description>SUSE Bug 967815</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971085</URL>
        <Description>SUSE Bug 971085</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/988489</URL>
        <Description>SUSE Bug 988489</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The session-persistence implementation in Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 mishandles session attributes, which allows remote authenticated users to bypass intended SecurityManager restrictions and execute arbitrary code in a privileged context via a web application that places a crafted object in a session.</Note>
    </Notes>
    <CVE>CVE-2016-0714</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tomcat-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-admin-webapps-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-docs-webapp-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-el-3_0-api-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-embed-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-javadoc-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-jsp-2_3-api-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-jsvc-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-lib-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-servlet-3_1-api-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-webapps-8.0.36-3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0714.html</URL>
        <Description>CVE-2016-0714</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/967964</URL>
        <Description>SUSE Bug 967964</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971085</URL>
        <Description>SUSE Bug 971085</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The setGlobalContext method in org/apache/naming/factory/ResourceLinkFactory.java in Apache Tomcat 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M3 does not consider whether ResourceLinkFactory.setGlobalContext callers are authorized, which allows remote authenticated users to bypass intended SecurityManager restrictions and read or write to arbitrary application data, or cause a denial of service (application disruption), via a web application that sets a crafted global context.</Note>
    </Notes>
    <CVE>CVE-2016-0763</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tomcat-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-admin-webapps-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-docs-webapp-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-el-3_0-api-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-embed-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-javadoc-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-jsp-2_3-api-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-jsvc-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-lib-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-servlet-3_1-api-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-webapps-8.0.36-3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0763.html</URL>
        <Description>CVE-2016-0763</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/967966</URL>
        <Description>SUSE Bug 967966</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971085</URL>
        <Description>SUSE Bug 971085</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The MultipartStream class in Apache Commons Fileupload before 1.3.2, as used in Apache Tomcat 7.x before 7.0.70, 8.x before 8.0.36, 8.5.x before 8.5.3, and 9.x before 9.0.0.M7 and other products, allows remote attackers to cause a denial of service (CPU consumption) via a long boundary string.</Note>
    </Notes>
    <CVE>CVE-2016-3092</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tomcat-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-admin-webapps-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-docs-webapp-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-el-3_0-api-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-embed-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-javadoc-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-jsp-2_3-api-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-jsvc-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-lib-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-servlet-3_1-api-8.0.36-3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-webapps-8.0.36-3.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-3092.html</URL>
        <Description>CVE-2016-3092</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1068865</URL>
        <Description>SUSE Bug 1068865</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/986359</URL>
        <Description>SUSE Bug 986359</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/988489</URL>
        <Description>SUSE Bug 988489</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
