openSUSE Security Update : tomcat (openSUSE-2016-1455)

This script is Copyright (C) 2016-2017 Tenable Network Security, Inc.

Synopsis :

The remote openSUSE host is missing a security update.

Description :

This update for Tomcat provides the following fixes :

Feature changes :

The embedded Apache Commons DBCP component was updated to version 2.0.
(bsc#1010893 fate#321029)

Security fixes :

- CVE-2016-0762: Realm Timing Attack (bsc#1007854)

- CVE-2016-5018: Security Manager Bypass (bsc#1007855)

- CVE-2016-6794: System Property Disclosure (bsc#1007857)

- CVE-2016-6796: Manager Bypass (bsc#1007858)

- CVE-2016-6797: Unrestricted Access to Global Resources

- CVE-2016-8735: Remote code execution vulnerability in
JmxRemoteLifecycleListener (bsc#1011805)

- CVE-2016-6816: HTTP Request smuggling vulnerability due
to permitting invalid character in HTTP requests

Bugs fixed :

- Fixed StringIndexOutOfBoundsException in
WebAppClassLoaderBase.filter(). (bsc#974407)

- Fixed a deployment error in the examples webapp by
changing the context.xml format to the new one
introduced by Tomcat 8. (bsc#1004728)

- Enabled optional script. See section '(3.4)
Using the 'setenv' script' in

- Fixed regression caused by CVE-2016-6816.

This update supplies the new packages apache-commons-pool2 and
apache-commons-dbcp in version 2 to allow tomcat to use the DBCP 2.0

This update was imported from the SUSE:SLE-12-SP1:Update update

See also :

Solution :

Update the affected tomcat packages.

Risk factor :

High / CVSS Base Score : 7.5

Family: SuSE Local Security Checks

Nessus Plugin ID: 95790 ()

Bugtraq ID:

CVE ID: CVE-2016-0762

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now