<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">tomcat10-10.1.42-1.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2025:15302-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-07-03T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-07-03T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-07-03T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">tomcat10-10.1.42-1.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the tomcat10-10.1.42-1.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2025-15302</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-46701/</URL>
      <Description>SUSE CVE CVE-2025-46701 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-48988/</URL>
      <Description>SUSE CVE CVE-2025-48988 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-49125/</URL>
      <Description>SUSE CVE CVE-2025-49125 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="tomcat10-10.1.42-1.1">
      <FullProductName ProductID="tomcat10-10.1.42-1.1">tomcat10-10.1.42-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tomcat10-admin-webapps-10.1.42-1.1">
      <FullProductName ProductID="tomcat10-admin-webapps-10.1.42-1.1">tomcat10-admin-webapps-10.1.42-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tomcat10-doc-10.1.42-1.1">
      <FullProductName ProductID="tomcat10-doc-10.1.42-1.1">tomcat10-doc-10.1.42-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tomcat10-docs-webapp-10.1.42-1.1">
      <FullProductName ProductID="tomcat10-docs-webapp-10.1.42-1.1">tomcat10-docs-webapp-10.1.42-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tomcat10-el-5_0-api-10.1.42-1.1">
      <FullProductName ProductID="tomcat10-el-5_0-api-10.1.42-1.1">tomcat10-el-5_0-api-10.1.42-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tomcat10-embed-10.1.42-1.1">
      <FullProductName ProductID="tomcat10-embed-10.1.42-1.1">tomcat10-embed-10.1.42-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tomcat10-jsp-3_1-api-10.1.42-1.1">
      <FullProductName ProductID="tomcat10-jsp-3_1-api-10.1.42-1.1">tomcat10-jsp-3_1-api-10.1.42-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tomcat10-jsvc-10.1.42-1.1">
      <FullProductName ProductID="tomcat10-jsvc-10.1.42-1.1">tomcat10-jsvc-10.1.42-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tomcat10-lib-10.1.42-1.1">
      <FullProductName ProductID="tomcat10-lib-10.1.42-1.1">tomcat10-lib-10.1.42-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tomcat10-servlet-6_0-api-10.1.42-1.1">
      <FullProductName ProductID="tomcat10-servlet-6_0-api-10.1.42-1.1">tomcat10-servlet-6_0-api-10.1.42-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tomcat10-webapps-10.1.42-1.1">
      <FullProductName ProductID="tomcat10-webapps-10.1.42-1.1">tomcat10-webapps-10.1.42-1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="tomcat10-10.1.42-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:tomcat10-10.1.42-1.1">tomcat10-10.1.42-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat10-admin-webapps-10.1.42-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.42-1.1">tomcat10-admin-webapps-10.1.42-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat10-doc-10.1.42-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:tomcat10-doc-10.1.42-1.1">tomcat10-doc-10.1.42-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat10-docs-webapp-10.1.42-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.42-1.1">tomcat10-docs-webapp-10.1.42-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat10-el-5_0-api-10.1.42-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.42-1.1">tomcat10-el-5_0-api-10.1.42-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat10-embed-10.1.42-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:tomcat10-embed-10.1.42-1.1">tomcat10-embed-10.1.42-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat10-jsp-3_1-api-10.1.42-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.42-1.1">tomcat10-jsp-3_1-api-10.1.42-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat10-jsvc-10.1.42-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:tomcat10-jsvc-10.1.42-1.1">tomcat10-jsvc-10.1.42-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat10-lib-10.1.42-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:tomcat10-lib-10.1.42-1.1">tomcat10-lib-10.1.42-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat10-servlet-6_0-api-10.1.42-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.42-1.1">tomcat10-servlet-6_0-api-10.1.42-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat10-webapps-10.1.42-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:tomcat10-webapps-10.1.42-1.1">tomcat10-webapps-10.1.42-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Improper Handling of Case Sensitivity vulnerability in Apache Tomcat's GCI servlet allows security constraint bypass of security constraints that apply to the pathInfo component of a URI mapped to the CGI servlet.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.6, from 10.1.0-M1 through 10.1.40, from 9.0.0.M1 through 9.0.104.
The following versions were EOL at the time the CVE was created but are 
known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions 
may also be affected.


Users are recommended to upgrade to version 11.0.7, 10.1.41 or 9.0.105, which fixes the issue.</Note>
    </Notes>
    <CVE>CVE-2025-46701</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tomcat10-10.1.42-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.42-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat10-doc-10.1.42-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.42-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.42-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat10-embed-10.1.42-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.42-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat10-jsvc-10.1.42-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat10-lib-10.1.42-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.42-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat10-webapps-10.1.42-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-46701.html</URL>
        <Description>CVE-2025-46701</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1243815</URL>
        <Description>SUSE Bug 1243815</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Allocation of Resources Without Limits or Throttling vulnerability in Apache Tomcat.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0-M1 through 10.1.41, from 9.0.0.M1 through 9.0.105.
The following versions were EOL at the time the CVE was created but are 
known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions 
may also be affected.


Users are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue.</Note>
    </Notes>
    <CVE>CVE-2025-48988</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tomcat10-10.1.42-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.42-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat10-doc-10.1.42-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.42-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.42-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat10-embed-10.1.42-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.42-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat10-jsvc-10.1.42-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat10-lib-10.1.42-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.42-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat10-webapps-10.1.42-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-48988.html</URL>
        <Description>CVE-2025-48988</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1244656</URL>
        <Description>SUSE Bug 1244656</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Authentication Bypass Using an Alternate Path or Channel vulnerability in Apache Tomcat.   When using PreResources or PostResources mounted other than at the root of the web application, it was possible to access those resources via an unexpected path. That path was likely not to be protected by the same security constraints as the expected path, allowing those security constraints to be bypassed.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0-M1 through 10.1.41, from 9.0.0.M1 through 9.0.105.
The following versions were EOL at the time the CVE was created but are 
known to be affected: 8.5.0 through 8.5.100. Other, older, EOL versions 
may also be affected.


Users are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue.</Note>
    </Notes>
    <CVE>CVE-2025-49125</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:tomcat10-10.1.42-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.42-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat10-doc-10.1.42-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.42-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.42-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat10-embed-10.1.42-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.42-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat10-jsvc-10.1.42-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat10-lib-10.1.42-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.42-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:tomcat10-webapps-10.1.42-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-49125.html</URL>
        <Description>CVE-2025-49125</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1244649</URL>
        <Description>SUSE Bug 1244649</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
