{"affected":[{"ecosystem_specific":{"binaries":[{"tomcat":"8.0.32-10.13.2","tomcat-admin-webapps":"8.0.32-10.13.2","tomcat-docs-webapp":"8.0.32-10.13.2","tomcat-el-3_0-api":"8.0.32-10.13.2","tomcat-javadoc":"8.0.32-10.13.2","tomcat-jsp-2_3-api":"8.0.32-10.13.2","tomcat-lib":"8.0.32-10.13.2","tomcat-servlet-3_1-api":"8.0.32-10.13.2","tomcat-webapps":"8.0.32-10.13.2"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP1","name":"tomcat","purl":"pkg:rpm/suse/tomcat&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"8.0.32-10.13.2"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"tomcat":"8.0.32-10.13.2","tomcat-admin-webapps":"8.0.32-10.13.2","tomcat-docs-webapp":"8.0.32-10.13.2","tomcat-el-3_0-api":"8.0.32-10.13.2","tomcat-javadoc":"8.0.32-10.13.2","tomcat-jsp-2_3-api":"8.0.32-10.13.2","tomcat-lib":"8.0.32-10.13.2","tomcat-servlet-3_1-api":"8.0.32-10.13.2","tomcat-webapps":"8.0.32-10.13.2"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP1","name":"tomcat","purl":"pkg:rpm/suse/tomcat&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"8.0.32-10.13.2"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\nThis update for Tomcat provides the following fixes:\n\nFeature changes:\n\nThe embedded Apache Commons DBCP component was updated to version 2.0. (bsc#1010893 fate#321029)\n\nSecurity fixes:\n- CVE-2016-0762: Realm Timing Attack (bsc#1007854)\n- CVE-2016-5018: Security Manager Bypass (bsc#1007855)\n- CVE-2016-6794: System Property Disclosure (bsc#1007857)\n- CVE-2016-6796: Manager Bypass (bsc#1007858)\n- CVE-2016-6797: Unrestricted Access to Global Resources (bsc#1007853)\n- CVE-2016-8735: Remote code execution vulnerability in JmxRemoteLifecycleListener (bsc#1011805)\n- CVE-2016-6816: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests (bsc#1011812)\n\nBugs fixed:\n- Fixed StringIndexOutOfBoundsException in WebAppClassLoaderBase.filter().\n  (bsc#974407)\n- Fixed a deployment error in the examples webapp by changing the context.xml\n  format to the new one introduced by Tomcat 8. (bsc#1004728)\n- Enabled optional setenv.sh script. See section '(3.4) Using the 'setenv' script'\n  in http://tomcat.apache.org/tomcat-8.0-doc/RUNNING.txt. (bsc#1002639)\n- Fixed regression caused by CVE-2016-6816.\n","id":"SUSE-SU-2016:3079-1","modified":"2016-12-10T18:18:26Z","published":"2016-12-10T18:18:26Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2016/suse-su-20163079-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1002639"},{"type":"REPORT","url":"https://bugzilla.suse.com/1004728"},{"type":"REPORT","url":"https://bugzilla.suse.com/1007853"},{"type":"REPORT","url":"https://bugzilla.suse.com/1007854"},{"type":"REPORT","url":"https://bugzilla.suse.com/1007855"},{"type":"REPORT","url":"https://bugzilla.suse.com/1007857"},{"type":"REPORT","url":"https://bugzilla.suse.com/1007858"},{"type":"REPORT","url":"https://bugzilla.suse.com/1010893"},{"type":"REPORT","url":"https://bugzilla.suse.com/1011805"},{"type":"REPORT","url":"https://bugzilla.suse.com/1011812"},{"type":"REPORT","url":"https://bugzilla.suse.com/974407"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-0762"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-5018"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-6794"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-6796"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-6797"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-6816"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-8735"}],"related":["CVE-2016-0762","CVE-2016-5018","CVE-2016-6794","CVE-2016-6796","CVE-2016-6797","CVE-2016-6816","CVE-2016-8735"],"summary":"Security update for tomcat","upstream":["CVE-2016-0762","CVE-2016-5018","CVE-2016-6794","CVE-2016-6796","CVE-2016-6797","CVE-2016-6816","CVE-2016-8735"]}