<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">tomcat-9.0.82-2.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:13382</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-17T21:45:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-17T21:45:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-17T21:45:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">tomcat-9.0.82-2.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the tomcat-9.0.82-2.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-13382</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL/>
      <Description>E-Mail link for openSUSE-SU-2024:13382</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-42794/</URL>
      <Description>SUSE CVE CVE-2023-42794 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-42795/</URL>
      <Description>SUSE CVE CVE-2023-42795 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-45648/</URL>
      <Description>SUSE CVE CVE-2023-45648 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="tomcat-9.0.82-2.1">
      <FullProductName ProductID="tomcat-9.0.82-2.1">tomcat-9.0.82-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tomcat-admin-webapps-9.0.82-2.1">
      <FullProductName ProductID="tomcat-admin-webapps-9.0.82-2.1">tomcat-admin-webapps-9.0.82-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tomcat-docs-webapp-9.0.82-2.1">
      <FullProductName ProductID="tomcat-docs-webapp-9.0.82-2.1">tomcat-docs-webapp-9.0.82-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tomcat-el-3_0-api-9.0.82-2.1">
      <FullProductName ProductID="tomcat-el-3_0-api-9.0.82-2.1">tomcat-el-3_0-api-9.0.82-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tomcat-embed-9.0.82-2.1">
      <FullProductName ProductID="tomcat-embed-9.0.82-2.1">tomcat-embed-9.0.82-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tomcat-javadoc-9.0.82-2.1">
      <FullProductName ProductID="tomcat-javadoc-9.0.82-2.1">tomcat-javadoc-9.0.82-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tomcat-jsp-2_3-api-9.0.82-2.1">
      <FullProductName ProductID="tomcat-jsp-2_3-api-9.0.82-2.1">tomcat-jsp-2_3-api-9.0.82-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tomcat-jsvc-9.0.82-2.1">
      <FullProductName ProductID="tomcat-jsvc-9.0.82-2.1">tomcat-jsvc-9.0.82-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tomcat-lib-9.0.82-2.1">
      <FullProductName ProductID="tomcat-lib-9.0.82-2.1">tomcat-lib-9.0.82-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tomcat-servlet-4_0-api-9.0.82-2.1">
      <FullProductName ProductID="tomcat-servlet-4_0-api-9.0.82-2.1">tomcat-servlet-4_0-api-9.0.82-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tomcat-webapps-9.0.82-2.1">
      <FullProductName ProductID="tomcat-webapps-9.0.82-2.1">tomcat-webapps-9.0.82-2.1</FullProductName>
    </Branch>
    <Relationship ProductReference="tomcat-9.0.82-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:tomcat-9.0.82-2.1">tomcat-9.0.82-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat-admin-webapps-9.0.82-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:tomcat-admin-webapps-9.0.82-2.1">tomcat-admin-webapps-9.0.82-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat-docs-webapp-9.0.82-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:tomcat-docs-webapp-9.0.82-2.1">tomcat-docs-webapp-9.0.82-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat-el-3_0-api-9.0.82-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.82-2.1">tomcat-el-3_0-api-9.0.82-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat-embed-9.0.82-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:tomcat-embed-9.0.82-2.1">tomcat-embed-9.0.82-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat-javadoc-9.0.82-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:tomcat-javadoc-9.0.82-2.1">tomcat-javadoc-9.0.82-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat-jsp-2_3-api-9.0.82-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.82-2.1">tomcat-jsp-2_3-api-9.0.82-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat-jsvc-9.0.82-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:tomcat-jsvc-9.0.82-2.1">tomcat-jsvc-9.0.82-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat-lib-9.0.82-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:tomcat-lib-9.0.82-2.1">tomcat-lib-9.0.82-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat-servlet-4_0-api-9.0.82-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.82-2.1">tomcat-servlet-4_0-api-9.0.82-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat-webapps-9.0.82-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:tomcat-webapps-9.0.82-2.1">tomcat-webapps-9.0.82-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Incomplete Cleanup vulnerability in Apache Tomcat.

The internal fork of Commons FileUpload packaged with Apache Tomcat 9.0.70 through 9.0.80 and 8.5.85 through 8.5.93 included an unreleased, 
in progress refactoring that exposed a potential denial of service on 
Windows if a web application opened a stream for an uploaded file but 
failed to close the stream. The file would never be deleted from disk 
creating the possibility of an eventual denial of service due to the 
disk being full.

Users are recommended to upgrade to version 9.0.81 onwards or 8.5.94 onwards, which fixes the issue.

</Note>
    </Notes>
    <CVE>CVE-2023-42794</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tomcat-9.0.82-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-admin-webapps-9.0.82-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-docs-webapp-9.0.82-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.82-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-embed-9.0.82-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-javadoc-9.0.82-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.82-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-jsvc-9.0.82-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-lib-9.0.82-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.82-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-webapps-9.0.82-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-42794.html</URL>
        <Description>CVE-2023-42794</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1216120</URL>
        <Description>SUSE Bug 1216120</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Incomplete Cleanup vulnerability in Apache Tomcat.When recycling various internal objects in Apache Tomcat from 11.0.0-M1 through 11.0.0-M11, from 10.1.0-M1 through 10.1.13, from 9.0.0-M1 through 9.0.80 and from 8.5.0 through 8.5.93, an error could 
cause Tomcat to skip some parts of the recycling process leading to 
information leaking from the current request/response to the next.

Users are recommended to upgrade to version 11.0.0-M12 onwards, 10.1.14 onwards, 9.0.81 onwards or 8.5.94 onwards, which fixes the issue.

</Note>
    </Notes>
    <CVE>CVE-2023-42795</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tomcat-9.0.82-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-admin-webapps-9.0.82-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-docs-webapp-9.0.82-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.82-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-embed-9.0.82-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-javadoc-9.0.82-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.82-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-jsvc-9.0.82-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-lib-9.0.82-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.82-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-webapps-9.0.82-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-42795.html</URL>
        <Description>CVE-2023-42795</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1216119</URL>
        <Description>SUSE Bug 1216119</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Improper Input Validation vulnerability in Apache Tomcat.Tomcat from 11.0.0-M1 through 11.0.0-M11, from 10.1.0-M1 through 10.1.13, from 9.0.0-M1 through 9.0.81 and from 8.5.0 through 8.5.93 did not correctly parse HTTP trailer headers. A specially 
crafted, invalid trailer header could cause Tomcat to treat a single 
request as multiple requests leading to the possibility of request 
smuggling when behind a reverse proxy.

Users are recommended to upgrade to version 11.0.0-M12 onwards, 10.1.14 onwards, 9.0.81 onwards or 8.5.94 onwards, which fix the issue.

</Note>
    </Notes>
    <CVE>CVE-2023-45648</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tomcat-9.0.82-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-admin-webapps-9.0.82-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-docs-webapp-9.0.82-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.82-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-embed-9.0.82-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-javadoc-9.0.82-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.82-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-jsvc-9.0.82-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-lib-9.0.82-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.82-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat-webapps-9.0.82-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-45648.html</URL>
        <Description>CVE-2023-45648</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1216118</URL>
        <Description>SUSE Bug 1216118</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
