Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2025:02992-1

Опубликовано: 27 авг. 2025
Источник: suse-cvrf

Описание

Security update for tomcat11

This update for tomcat11 fixes the following issues:

Updated to Tomcat 11.0.10

  • CVE-2025-48989: Fixed 'MadeYouReset' DoS in HTTP/2 due to client triggered stream reset (bsc#1243895)

Other fixes:

  • Catalina
    • Fix: Fix bloom filter population for archive indexing when using a packed WAR containing one or more JAR files. (markt)
  • Coyote
    • Fix: 69748: Add missing call to set keep-alive timeout when using HTTP/1.1 following an async request, which was present for AJP. (remm/markt)
    • Fix: 69762: Fix possible overflow during HPACK decoding of integers. Note that the maximum permitted value of an HPACK decoded integer is Integer.MAX_VALUE. (markt)
    • Fix: Update the HTTP/2 overhead documentation - particularly the code comments - to reflect the deprecation of the PRIORITY frame and clarify that a stream reset always triggers an overhead increase. (markt)
  • Cluster
    • Update: Add enableStatistics configuration attribute for the DeltaManager, defaulting to true. (remm)
  • WebSocket
    • Fix: Align the WebSocket extension handling for WebSocket client connections with WebSocket server connections. The WebSocket client now only includes an extension requested by an endpoint in the opening handshake if the WebSocket client supports that extension. (markt)
  • Web applications
    • Fix: Manager and Host Manager. Provide the Manager and Host Manager web applications with a dedicated favicon file rather than using the one from the ROOT web application which might not be present or may represent something entirely different. Pull requests #876 and #878 by Simon Arame.
  • Other
    • Update: Update Checkstyle to 10.26.1. (markt)
    • Add: Improvements to French translations. (remm)
    • Add: Improvements to Japanese translations by tak7iji. (markt)

Список пакетов

SUSE Linux Enterprise Module for Web and Scripting 15 SP6
tomcat11-11.0.10-150600.13.9.1
tomcat11-admin-webapps-11.0.10-150600.13.9.1
tomcat11-el-6_0-api-11.0.10-150600.13.9.1
tomcat11-jsp-4_0-api-11.0.10-150600.13.9.1
tomcat11-lib-11.0.10-150600.13.9.1
tomcat11-servlet-6_1-api-11.0.10-150600.13.9.1
tomcat11-webapps-11.0.10-150600.13.9.1
SUSE Linux Enterprise Module for Web and Scripting 15 SP7
tomcat11-11.0.10-150600.13.9.1
tomcat11-admin-webapps-11.0.10-150600.13.9.1
tomcat11-el-6_0-api-11.0.10-150600.13.9.1
tomcat11-jsp-4_0-api-11.0.10-150600.13.9.1
tomcat11-lib-11.0.10-150600.13.9.1
tomcat11-servlet-6_1-api-11.0.10-150600.13.9.1
tomcat11-webapps-11.0.10-150600.13.9.1
openSUSE Leap 15.6
tomcat11-11.0.10-150600.13.9.1
tomcat11-admin-webapps-11.0.10-150600.13.9.1
tomcat11-doc-11.0.10-150600.13.9.1
tomcat11-docs-webapp-11.0.10-150600.13.9.1
tomcat11-el-6_0-api-11.0.10-150600.13.9.1
tomcat11-embed-11.0.10-150600.13.9.1
tomcat11-jsp-4_0-api-11.0.10-150600.13.9.1
tomcat11-jsvc-11.0.10-150600.13.9.1
tomcat11-lib-11.0.10-150600.13.9.1
tomcat11-servlet-6_1-api-11.0.10-150600.13.9.1
tomcat11-webapps-11.0.10-150600.13.9.1

Описание

Improper Resource Shutdown or Release vulnerability in Apache Tomcat made Tomcat vulnerable to the made you reset attack. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.9, from 10.1.0-M1 through 10.1.43 and from 9.0.0.M1 through 9.0.107. Older, EOL versions may also be affected. Users are recommended to upgrade to one of versions 11.0.10, 10.1.44 or 9.0.108 which fix the issue.


Затронутые продукты
SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat11-11.0.10-150600.13.9.1
SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat11-admin-webapps-11.0.10-150600.13.9.1
SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat11-el-6_0-api-11.0.10-150600.13.9.1
SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat11-jsp-4_0-api-11.0.10-150600.13.9.1

Ссылки