openSUSE-SU-2020:0711-1

See a problem?
Import Source
https://ftp.suse.com/pub/projects/security/osv/openSUSE-SU-2020:0711-1.json
JSON Data
https://api.osv.dev/v1/vulns/openSUSE-SU-2020:0711-1
Related
Published
2020-05-24T22:12:17Z
Modified
2020-05-24T22:12:17Z
Summary
Security update for tomcat
Details

This update for tomcat fixes the following issues:

  • Update to Tomcat 9.0.35. See changelog at http://tomcat.apache.org/tomcat-9.0-doc/changelog.html#Tomcat9.0.35(markt)

  • CVE-2020-9484 (bsc#1171928) Apache Tomcat Remote Code Execution via session persistence

    If an attacker was able to control the contents and name of a file on a server configured to use the PersistenceManager, then the attacker could have triggered a remote code execution via deserialization of the file under their control.

This update was imported from the SUSE:SLE-15-SP1:Update update project.

References

Affected packages

openSUSE:Leap 15.1 / tomcat

Package

Name
tomcat
Purl
purl:rpm/suse/tomcat&distro=openSUSE%20Leap%2015.1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
9.0.35-lp151.3.18.1

Ecosystem specific

{
    "binaries": [
        {
            "tomcat-lib": "9.0.35-lp151.3.18.1",
            "tomcat-jsvc": "9.0.35-lp151.3.18.1",
            "tomcat-webapps": "9.0.35-lp151.3.18.1",
            "tomcat-embed": "9.0.35-lp151.3.18.1",
            "tomcat-docs-webapp": "9.0.35-lp151.3.18.1",
            "tomcat-servlet-4_0-api": "9.0.35-lp151.3.18.1",
            "tomcat": "9.0.35-lp151.3.18.1",
            "tomcat-el-3_0-api": "9.0.35-lp151.3.18.1",
            "tomcat-admin-webapps": "9.0.35-lp151.3.18.1",
            "tomcat-javadoc": "9.0.35-lp151.3.18.1",
            "tomcat-jsp-2_3-api": "9.0.35-lp151.3.18.1"
        }
    ]
}