Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2024-56337
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache Tomcat |
Version: 11.0.0-M1 ≤ 11.0.1 Version: 10.1.0-M1 ≤ 10.1.33 Version: 9.0.0.M1 ≤ 9.0.97 |
{ containers: { adp: [ { metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, }, { other: { content: { id: "CVE-2024-56337", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-12-31T00:00:00+00:00", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2025-01-01T04:56:29.394Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, { providerMetadata: { dateUpdated: "2025-01-03T12:04:31.817Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { url: "https://security.netapp.com/advisory/ntap-20250103-0002/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Apache Tomcat", vendor: "Apache Software Foundation", versions: [ { lessThanOrEqual: "11.0.1", status: "affected", version: "11.0.0-M1", versionType: "semver", }, { lessThanOrEqual: "10.1.33", status: "affected", version: "10.1.0-M1", versionType: "semver", }, { lessThanOrEqual: "9.0.97", status: "affected", version: "9.0.0.M1", versionType: "semver", }, ], }, ], credits: [ { lang: "en", type: "finder", value: "This vulnerability was first reported by Nacl, WHOAMI, Yemoli and Ruozhi.", }, { lang: "en", type: "finder", value: "This vulnerability was independently reported with a very helpful PoC by dawu@knownsec 404 team and Sunflower@knownsec 404 team", }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<p>Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache Tomcat.</p><p>This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.</p><p>The mitigation for CVE-2024-50379 was incomplete.</p><p>Users running Tomcat on a case insensitive file system with the default servlet write enabled (readonly initialisation \nparameter set to the non-default value of false) may need additional configuration to fully mitigate CVE-2024-50379 depending on which version of Java they are using with Tomcat:<br>- running on Java 8 or Java 11: the system property sun.io.useCanonCaches must be explicitly set to false (it defaults to true)<br>- running on Java 17: the system property sun.io.useCanonCaches, if set, must be set to false (it defaults to false)<br>- running on Java 21 onwards: no further configuration is required (the system property and the problematic cache have been removed)</p><p><span style=\"background-color: var(--wht);\">Tomcat 11.0.3, 10.1.35 and 9.0.99 onwards will include checks that sun.io.useCanonCaches is set appropriately before allowing the default servlet to be write enabled on a case insensitive file system. Tomcat will also set sun.io.useCanonCaches to false by default where it can.</span></p>", }, ], value: "Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache Tomcat.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.\n\nThe mitigation for CVE-2024-50379 was incomplete.\n\nUsers running Tomcat on a case insensitive file system with the default servlet write enabled (readonly initialisation \nparameter set to the non-default value of false) may need additional configuration to fully mitigate CVE-2024-50379 depending on which version of Java they are using with Tomcat:\n- running on Java 8 or Java 11: the system property sun.io.useCanonCaches must be explicitly set to false (it defaults to true)\n- running on Java 17: the system property sun.io.useCanonCaches, if set, must be set to false (it defaults to false)\n- running on Java 21 onwards: no further configuration is required (the system property and the problematic cache have been removed)\n\nTomcat 11.0.3, 10.1.35 and 9.0.99 onwards will include checks that sun.io.useCanonCaches is set appropriately before allowing the default servlet to be write enabled on a case insensitive file system. Tomcat will also set sun.io.useCanonCaches to false by default where it can.", }, ], metrics: [ { other: { content: { text: "important", }, type: "Textual description of severity", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-367", description: "CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-12-20T15:28:54.738Z", orgId: "f0158376-9dc2-43b6-827c-5f631a4d8d09", shortName: "apache", }, references: [ { tags: [ "vdb-entry", ], url: "https://www.cve.org/CVERecord?id=CVE-2024-50379", }, { tags: [ "vendor-advisory", ], url: "https://lists.apache.org/thread/b2b9qrgjrz1kvo4ym8y2wkfdvwoq6qbp", }, ], source: { discovery: "UNKNOWN", }, title: "Apache Tomcat: RCE due to TOCTOU issue in JSP compilation - CVE-2024-50379 mitigation was incomplete", x_generator: { engine: "Vulnogram 0.2.0", }, }, }, cveMetadata: { assignerOrgId: "f0158376-9dc2-43b6-827c-5f631a4d8d09", assignerShortName: "apache", cveId: "CVE-2024-56337", datePublished: "2024-12-20T15:28:54.738Z", dateReserved: "2024-12-20T11:16:29.949Z", dateUpdated: "2025-01-03T12:04:31.817Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { nvd: "{\"cve\":{\"id\":\"CVE-2024-56337\",\"sourceIdentifier\":\"security@apache.org\",\"published\":\"2024-12-20T16:15:24.260\",\"lastModified\":\"2025-01-03T12:15:26.787\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache Tomcat.\\n\\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.\\n\\nThe mitigation for CVE-2024-50379 was incomplete.\\n\\nUsers running Tomcat on a case insensitive file system with the default servlet write enabled (readonly initialisation \\nparameter set to the non-default value of false) may need additional configuration to fully mitigate CVE-2024-50379 depending on which version of Java they are using with Tomcat:\\n- running on Java 8 or Java 11: the system property sun.io.useCanonCaches must be explicitly set to false (it defaults to true)\\n- running on Java 17: the system property sun.io.useCanonCaches, if set, must be set to false (it defaults to false)\\n- running on Java 21 onwards: no further configuration is required (the system property and the problematic cache have been removed)\\n\\nTomcat 11.0.3, 10.1.35 and 9.0.99 onwards will include checks that sun.io.useCanonCaches is set appropriately before allowing the default servlet to be write enabled on a case insensitive file system. Tomcat will also set sun.io.useCanonCaches to false by default where it can.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de condición de ejecución de tiempo de uso y tiempo de verificación (TOCTOU) en Apache Tomcat. Este problema afecta a Apache Tomcat: desde 11.0.0-M1 hasta 11.0.1, desde 10.1.0-M1 hasta 10.1.33, desde 9.0.0.M1 hasta 9.0.97. La mitigación de CVE-2024-50379 fue incompleta. Los usuarios que ejecuten Tomcat en un sistema de archivos que no distinga entre mayúsculas y minúsculas con la escritura del servlet predeterminada habilitada (el parámetro de inicialización de solo lectura establecido en el valor no predeterminado de falso) pueden necesitar una configuración adicional para mitigar por completo CVE-2024-50379 según la versión de Java que estén usando con Tomcat: - ejecutándose en Java 8 o Java 11: la propiedad del sistema sun.io.useCanonCaches debe establecerse explícitamente en falso (el valor predeterminado es verdadero) - ejecutándose en Java 17: la propiedad del sistema sun.io.useCanonCaches, si está establecida, debe establecerse en falso (el valor predeterminado es falso) - ejecutándose en Java 21 en adelante: no se requiere ninguna configuración adicional (la propiedad del sistema y el caché problemático se han eliminado) Tomcat 11.0.3, 10.1.35 y 9.0.99 en adelante incluirán comprobaciones de que sun.io.useCanonCaches esté configurado correctamente antes de permitir que el servlet predeterminado esté habilitado para escritura en un sistema de archivos que no distinga entre mayúsculas y minúsculas. Tomcat también establecerá sun.io.useCanonCaches como falso de forma predeterminada cuando sea posible.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"security@apache.org\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-367\"}]}],\"references\":[{\"url\":\"https://lists.apache.org/thread/b2b9qrgjrz1kvo4ym8y2wkfdvwoq6qbp\",\"source\":\"security@apache.org\"},{\"url\":\"https://www.cve.org/CVERecord?id=CVE-2024-50379\",\"source\":\"security@apache.org\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20250103-0002/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}", vulnrichment: { containers: "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://security.netapp.com/advisory/ntap-20250103-0002/\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-01-03T12:04:31.817Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 9.8, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-56337\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-12-31T18:50:00.601639Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-12-31T18:50:23.435Z\"}}], \"cna\": {\"title\": \"Apache Tomcat: RCE due to TOCTOU issue in JSP compilation - CVE-2024-50379 mitigation was incomplete\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"This vulnerability was first reported by Nacl, WHOAMI, Yemoli and Ruozhi.\"}, {\"lang\": \"en\", \"type\": \"finder\", \"value\": \"This vulnerability was independently reported with a very helpful PoC by dawu@knownsec 404 team and Sunflower@knownsec 404 team\"}], \"metrics\": [{\"other\": {\"type\": \"Textual description of severity\", \"content\": {\"text\": \"important\"}}}], \"affected\": [{\"vendor\": \"Apache Software Foundation\", \"product\": \"Apache Tomcat\", \"versions\": [{\"status\": \"affected\", \"version\": \"11.0.0-M1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"11.0.1\"}, {\"status\": \"affected\", \"version\": \"10.1.0-M1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"10.1.33\"}, {\"status\": \"affected\", \"version\": \"9.0.0.M1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"9.0.97\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://www.cve.org/CVERecord?id=CVE-2024-50379\", \"tags\": [\"vdb-entry\"]}, {\"url\": \"https://lists.apache.org/thread/b2b9qrgjrz1kvo4ym8y2wkfdvwoq6qbp\", \"tags\": [\"vendor-advisory\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache Tomcat.\\n\\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.\\n\\nThe mitigation for CVE-2024-50379 was incomplete.\\n\\nUsers running Tomcat on a case insensitive file system with the default servlet write enabled (readonly initialisation \\nparameter set to the non-default value of false) may need additional configuration to fully mitigate CVE-2024-50379 depending on which version of Java they are using with Tomcat:\\n- running on Java 8 or Java 11: the system property\\u00a0sun.io.useCanonCaches must be explicitly set to false (it defaults to true)\\n- running on Java 17: the\\u00a0system property sun.io.useCanonCaches, if set, must be set to false\\u00a0(it defaults to false)\\n- running on Java 21 onwards: no further configuration is required\\u00a0(the system property and the problematic cache have been removed)\\n\\nTomcat 11.0.3, 10.1.35 and 9.0.99 onwards will include checks that\\u00a0sun.io.useCanonCaches is set appropriately before allowing the default servlet to be write enabled on a case insensitive file system. Tomcat will also set\\u00a0sun.io.useCanonCaches to false by default where it can.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"<p>Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache Tomcat.</p><p>This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.</p><p>The mitigation for CVE-2024-50379 was incomplete.</p><p>Users running Tomcat on a case insensitive file system with the default servlet write enabled (readonly initialisation \\nparameter set to the non-default value of false) may need additional configuration to fully mitigate CVE-2024-50379 depending on which version of Java they are using with Tomcat:<br>- running on Java 8 or Java 11: the system property sun.io.useCanonCaches must be explicitly set to false (it defaults to true)<br>- running on Java 17: the system property sun.io.useCanonCaches, if set, must be set to false (it defaults to false)<br>- running on Java 21 onwards: no further configuration is required (the system property and the problematic cache have been removed)</p><p><span style=\\\"background-color: var(--wht);\\\">Tomcat 11.0.3, 10.1.35 and 9.0.99 onwards will include checks that sun.io.useCanonCaches is set appropriately before allowing the default servlet to be write enabled on a case insensitive file system. Tomcat will also set sun.io.useCanonCaches to false by default where it can.</span></p>\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-367\", \"description\": \"CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition\"}]}], \"providerMetadata\": {\"orgId\": \"f0158376-9dc2-43b6-827c-5f631a4d8d09\", \"shortName\": \"apache\", \"dateUpdated\": \"2024-12-20T15:28:54.738Z\"}}}", cveMetadata: "{\"cveId\": \"CVE-2024-56337\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-01-03T12:04:31.817Z\", \"dateReserved\": \"2024-12-20T11:16:29.949Z\", \"assignerOrgId\": \"f0158376-9dc2-43b6-827c-5f631a4d8d09\", \"datePublished\": \"2024-12-20T15:28:54.738Z\", \"assignerShortName\": \"apache\"}", dataType: "CVE_RECORD", dataVersion: "5.1", }, }, }
ncsc-2025-0020
Vulnerability from csaf_ncscnl
Notes
{ document: { category: "csaf_security_advisory", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", }, }, lang: "nl", notes: [ { category: "legal_disclaimer", text: "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.", }, { category: "description", text: "Oracle heeft kwetsbaarheden verholpen in diverse database producten en subsystemen, zoals de Core Database, Graal, Application Express, GoldenGate en REST data.", title: "Feiten", }, { category: "description", text: "De kwetsbaarheden bevinden zich in verschillende componenten van de Oracle Database, waaronder de Data Mining component en de Java VM. Deze kwetsbaarheden stellen laaggeprivilegieerde geauthenticeerde gebruikers in staat om het systeem te compromitteren, wat kan leiden tot ongeautoriseerde toegang en gegevensmanipulatie. De Java VM-kwetsbaarheid kan ook leiden tot ongeautoriseerde wijzigingen van gegevens.", title: "Interpretaties", }, { category: "description", text: "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.", title: "Oplossingen", }, { category: "general", text: "medium", title: "Kans", }, { category: "general", text: "high", title: "Schade", }, { category: "general", text: "Unchecked Error Condition", title: "CWE-391", }, { category: "general", text: "Misinterpretation of Input", title: "CWE-115", }, { category: "general", text: "Return of Pointer Value Outside of Expected Range", title: "CWE-466", }, { category: "general", text: "Truncation of Security-relevant Information", title: "CWE-222", }, { category: "general", text: "Incorrect Calculation of Buffer Size", title: "CWE-131", }, { category: "general", text: "Improper Validation of Specified Type of Input", title: "CWE-1287", }, { category: "general", text: "Insecure Storage of Sensitive Information", title: "CWE-922", }, { category: "general", text: "Integer Underflow (Wrap or Wraparound)", title: "CWE-191", }, { category: "general", text: "Insufficient Granularity of Access Control", title: "CWE-1220", }, { category: "general", text: "Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')", title: "CWE-776", }, { category: "general", text: "Improper Handling of Case Sensitivity", title: "CWE-178", }, { category: "general", text: "Time-of-check Time-of-use (TOCTOU) Race Condition", title: "CWE-367", }, { category: "general", text: "Expected Behavior Violation", title: "CWE-440", }, { category: "general", text: "Improper Validation of Syntactic Correctness of Input", title: "CWE-1286", }, { category: "general", text: "Improper Check or Handling of Exceptional Conditions", title: "CWE-703", }, { category: "general", text: "Reachable Assertion", title: "CWE-617", }, { category: "general", text: "Uncontrolled Search Path Element", title: "CWE-427", }, { category: "general", text: "URL Redirection to Untrusted Site ('Open Redirect')", title: "CWE-601", }, { category: "general", text: "Authentication Bypass Using an Alternate Path or Channel", title: "CWE-288", }, { category: "general", text: "Improper Validation of Integrity Check Value", title: "CWE-354", }, { category: "general", text: "Integer Overflow or Wraparound", title: "CWE-190", }, { category: "general", text: "Improper Resource Shutdown or Release", title: "CWE-404", }, { category: "general", text: "Improper Access Control", title: "CWE-284", }, { category: "general", text: "Improper Restriction of Operations within the Bounds of a Memory Buffer", title: "CWE-119", }, { category: "general", text: "Inefficient Regular Expression Complexity", title: "CWE-1333", }, { category: "general", text: "Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')", title: "CWE-1321", }, { category: "general", text: "NULL Pointer Dereference", title: "CWE-476", }, { category: "general", text: "Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade')", title: "CWE-757", }, { category: "general", text: "Improper Control of Generation of Code ('Code Injection')", title: "CWE-94", }, { category: "general", text: "Uncontrolled Resource Consumption", title: "CWE-400", }, { category: "general", text: "Allocation of Resources Without Limits or Throttling", title: "CWE-770", }, { category: "general", text: "Deserialization of Untrusted Data", title: "CWE-502", }, { category: "general", text: "Uncontrolled Recursion", title: "CWE-674", }, { category: "general", text: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", title: "CWE-22", }, { category: "general", text: "Improper Restriction of XML External Entity Reference", title: "CWE-611", }, { category: "general", text: "Out-of-bounds Write", title: "CWE-787", }, { category: "general", text: "Exposure of Sensitive Information to an Unauthorized Actor", title: "CWE-200", }, { category: "general", text: "Heap-based Buffer Overflow", title: "CWE-122", }, { category: "general", text: "Stack-based Buffer Overflow", title: "CWE-121", }, { category: "general", text: "Loop with Unreachable Exit Condition ('Infinite Loop')", title: "CWE-835", }, { category: "general", text: "Improper Input Validation", title: "CWE-20", }, { category: "general", text: "Incorrect Default Permissions", title: "CWE-276", }, ], publisher: { category: "coordinator", contact_details: "cert@ncsc.nl", name: "Nationaal Cyber Security Centrum", namespace: "https://www.ncsc.nl/", }, references: [ { category: "external", summary: "Reference - cveprojectv5; nvd; oracle", url: "https://www.oracle.com/security-alerts/cpujan2025.html", }, ], title: "Kwetsbaarheden verholpen in Oracle Database producten", tracking: { current_release_date: "2025-01-22T13:30:16.354373Z", id: "NCSC-2025-0020", initial_release_date: "2025-01-22T13:30:16.354373Z", revision_history: [ { date: "2025-01-22T13:30:16.354373Z", number: "0", summary: "Initiele versie", }, ], status: "final", version: "1.0.0", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "graal_development_kit_for_micronaut", product: { name: "graal_development_kit_for_micronaut", product_id: "CSAFPID-1751216", product_identification_helper: { cpe: "cpe:2.3:a:oracle:graal_development_kit_for_micronaut:23.5-23.6:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "database_-_data_mining", product: { name: "database_-_data_mining", product_id: "CSAFPID-1751200", product_identification_helper: { cpe: "cpe:2.3:a:oracle:database_-_data_mining:19.3-19.25:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "database_-_data_mining", product: { name: "database_-_data_mining", product_id: "CSAFPID-1751199", product_identification_helper: { cpe: "cpe:2.3:a:oracle:database_-_data_mining:21.3-21.16:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "database_migration_assistant_for_unicode", product: { name: "database_migration_assistant_for_unicode", product_id: "CSAFPID-1751212", product_identification_helper: { cpe: "cpe:2.3:a:oracle:database_migration_assistant_for_unicode:19.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "database_server", product: { name: "database_server", product_id: "CSAFPID-1503604", product_identification_helper: { cpe: "cpe:2.3:a:oracle:database_server:_java_vm___23.4:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "database_-_graalvm_multilingual_engine", product: { name: "database_-_graalvm_multilingual_engine", product_id: "CSAFPID-1751223", product_identification_helper: { cpe: "cpe:2.3:a:oracle:database_-_graalvm_multilingual_engine:21.4-21.16:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "database_-_graalvm_multilingual_engine", product: { name: "database_-_graalvm_multilingual_engine", product_id: "CSAFPID-1751224", product_identification_helper: { cpe: "cpe:2.3:a:oracle:database_-_graalvm_multilingual_engine:23.5-23.6:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "application_express", product: { name: "application_express", product_id: "CSAFPID-1503575", product_identification_helper: { cpe: "cpe:2.3:a:oracle:application_express:23.2:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "application_express", product: { name: "application_express", product_id: "CSAFPID-1673188", product_identification_helper: { cpe: "cpe:2.3:a:oracle:application_express:24.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "goldengate", product: { name: "goldengate", product_id: "CSAFPID-342816", product_identification_helper: { cpe: "cpe:2.3:a:oracle:goldengate:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "goldengate_big_data_and_application_adapters", product: { name: "goldengate_big_data_and_application_adapters", product_id: "CSAFPID-816845", product_identification_helper: { cpe: "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "goldengate_big_data_and_application_adapters", product: { name: "goldengate_big_data_and_application_adapters", product_id: "CSAFPID-1650825", product_identification_helper: { cpe: "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:19.1.0.0.0-19.1.0.0.18:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "goldengate_big_data_and_application_adapters", product: { name: "goldengate_big_data_and_application_adapters", product_id: "CSAFPID-1751298", product_identification_helper: { cpe: "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:21.3.0.0.0-21.16.0.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "goldengate_big_data_and_application_adapters", product: { name: "goldengate_big_data_and_application_adapters", product_id: "CSAFPID-1751299", product_identification_helper: { cpe: "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:23.4-23.6:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "goldengate", product: { name: "goldengate", product_id: "CSAFPID-1650767", product_identification_helper: { cpe: "cpe:2.3:a:oracle:goldengate:19.1.0.0.0-19.23.0.0.240716:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "goldengate", product: { name: "goldengate", product_id: "CSAFPID-485902", product_identification_helper: { cpe: "cpe:2.3:a:oracle:goldengate:19.1.0.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "goldengate", product: { name: "goldengate", product_id: "CSAFPID-1503736", product_identification_helper: { cpe: "cpe:2.3:a:oracle:goldengate:19.23.0.0.240716:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "goldengate", product: { name: "goldengate", product_id: "CSAFPID-1503739", product_identification_helper: { cpe: "cpe:2.3:a:oracle:goldengate:21.14:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "goldengate", product: { name: "goldengate", product_id: "CSAFPID-1751093", product_identification_helper: { cpe: "cpe:2.3:a:oracle:goldengate:21.16:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "goldengate", product: { name: "goldengate", product_id: "CSAFPID-1751094", product_identification_helper: { cpe: "cpe:2.3:a:oracle:goldengate:23.4:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "goldengate", product: { name: "goldengate", product_id: "CSAFPID-1751095", product_identification_helper: { cpe: "cpe:2.3:a:oracle:goldengate:23.6:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "goldengate", product: { name: "goldengate", product_id: "CSAFPID-1751204", product_identification_helper: { cpe: "cpe:2.3:a:oracle:goldengate:23.4-23.6:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "goldengate", product: { name: "goldengate", product_id: "CSAFPID-1503738", product_identification_helper: { cpe: "cpe:2.3:a:oracle:goldengate:21.3:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "goldengate", product: { name: "goldengate", product_id: "CSAFPID-1751203", product_identification_helper: { cpe: "cpe:2.3:a:oracle:goldengate:21.3-21.16:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "goldengate", product: { name: "goldengate", product_id: "CSAFPID-1650765", product_identification_helper: { cpe: "cpe:2.3:a:oracle:goldengate:21.3-21.14:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "rest_data_services", product: { name: "rest_data_services", product_id: "CSAFPID-711746", product_identification_helper: { cpe: "cpe:2.3:a:oracle:rest_data_services:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "rest_data_services", product: { name: "rest_data_services", product_id: "CSAFPID-1751305", product_identification_helper: { cpe: "cpe:2.3:a:oracle:rest_data_services:24.2.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "rest_data_services", product: { name: "rest_data_services", product_id: "CSAFPID-1751304", product_identification_helper: { cpe: "cpe:2.3:a:oracle:rest_data_services:24.3.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "secure_backup", product: { name: "secure_backup", product_id: "CSAFPID-667692", product_identification_helper: { cpe: "cpe:2.3:a:oracle:secure_backup:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "secure_backup", product: { name: "secure_backup", product_id: "CSAFPID-345049", product_identification_helper: { cpe: "cpe:2.3:a:oracle:secure_backup:18.1.0.1.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "secure_backup", product: { name: "secure_backup", product_id: "CSAFPID-611417", product_identification_helper: { cpe: "cpe:2.3:a:oracle:secure_backup:18.1.0.2.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "secure_backup", product: { name: "secure_backup", product_id: "CSAFPID-1673422", product_identification_helper: { cpe: "cpe:2.3:a:oracle:secure_backup:19.1.0.0.0:*:*:*:*:*:*:*", }, }, }, ], category: "vendor", name: "oracle", }, ], }, vulnerabilities: [ { cve: "CVE-2024-38998", cwe: { id: "CWE-1321", name: "Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')", }, notes: [ { category: "other", text: "Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')", title: "CWE-1321", }, ], product_status: { known_affected: [ "CSAFPID-1503575", "CSAFPID-1673188", "CSAFPID-1751204", "CSAFPID-1751203", ], }, references: [ { category: "self", summary: "CVE-2024-38998", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38998.json", }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-1503575", "CSAFPID-1673188", "CSAFPID-1751204", "CSAFPID-1751203", ], }, ], title: "CVE-2024-38998", }, { cve: "CVE-2024-38999", cwe: { id: "CWE-1321", name: "Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')", }, notes: [ { category: "other", text: "Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')", title: "CWE-1321", }, ], product_status: { known_affected: [ "CSAFPID-1503575", "CSAFPID-1673188", "CSAFPID-1751204", "CSAFPID-1751203", ], }, references: [ { category: "self", summary: "CVE-2024-38999", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38999.json", }, ], scores: [ { cvss_v3: { baseScore: 10, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-1503575", "CSAFPID-1673188", "CSAFPID-1751204", "CSAFPID-1751203", ], }, ], title: "CVE-2024-38999", }, { cve: "CVE-2024-45490", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, notes: [ { category: "other", text: "Integer Overflow or Wraparound", title: "CWE-190", }, { category: "other", text: "Incorrect Calculation of Buffer Size", title: "CWE-131", }, { category: "other", text: "Improper Restriction of XML External Entity Reference", title: "CWE-611", }, ], references: [ { category: "self", summary: "CVE-2024-45490", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45490.json", }, ], title: "CVE-2024-45490", }, { cve: "CVE-2024-45491", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, notes: [ { category: "other", text: "Integer Overflow or Wraparound", title: "CWE-190", }, ], references: [ { category: "self", summary: "CVE-2024-45491", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45491.json", }, ], title: "CVE-2024-45491", }, { cve: "CVE-2024-45492", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, notes: [ { category: "other", text: "Integer Overflow or Wraparound", title: "CWE-190", }, ], references: [ { category: "self", summary: "CVE-2024-45492", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45492.json", }, ], title: "CVE-2024-45492", }, { cve: "CVE-2024-45772", cwe: { id: "CWE-502", name: "Deserialization of Untrusted Data", }, notes: [ { category: "other", text: "Deserialization of Untrusted Data", title: "CWE-502", }, ], references: [ { category: "self", summary: "CVE-2024-45772", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45772.json", }, ], title: "CVE-2024-45772", }, { cve: "CVE-2024-47554", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, notes: [ { category: "other", text: "Uncontrolled Resource Consumption", title: "CWE-400", }, ], references: [ { category: "self", summary: "CVE-2024-47554", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47554.json", }, ], title: "CVE-2024-47554", }, { cve: "CVE-2024-47561", cwe: { id: "CWE-502", name: "Deserialization of Untrusted Data", }, notes: [ { category: "other", text: "Deserialization of Untrusted Data", title: "CWE-502", }, ], product_status: { known_affected: [ "CSAFPID-1650825", "CSAFPID-1751298", "CSAFPID-1751299", ], }, references: [ { category: "self", summary: "CVE-2024-47561", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47561.json", }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-1650825", "CSAFPID-1751298", "CSAFPID-1751299", ], }, ], title: "CVE-2024-47561", }, { cve: "CVE-2024-50379", cwe: { id: "CWE-367", name: "Time-of-check Time-of-use (TOCTOU) Race Condition", }, notes: [ { category: "other", text: "Time-of-check Time-of-use (TOCTOU) Race Condition", title: "CWE-367", }, ], references: [ { category: "self", summary: "CVE-2024-50379", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50379.json", }, ], title: "CVE-2024-50379", }, { cve: "CVE-2024-52316", cwe: { id: "CWE-391", name: "Unchecked Error Condition", }, notes: [ { category: "other", text: "Unchecked Error Condition", title: "CWE-391", }, { category: "other", text: "Authentication Bypass Using an Alternate Path or Channel", title: "CWE-288", }, ], references: [ { category: "self", summary: "CVE-2024-52316", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-52316.json", }, ], title: "CVE-2024-52316", }, { cve: "CVE-2024-54677", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, notes: [ { category: "other", text: "Uncontrolled Resource Consumption", title: "CWE-400", }, ], references: [ { category: "self", summary: "CVE-2024-54677", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-54677.json", }, ], title: "CVE-2024-54677", }, { cve: "CVE-2024-56337", cwe: { id: "CWE-367", name: "Time-of-check Time-of-use (TOCTOU) Race Condition", }, notes: [ { category: "other", text: "Time-of-check Time-of-use (TOCTOU) Race Condition", title: "CWE-367", }, ], references: [ { category: "self", summary: "CVE-2024-56337", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-56337.json", }, ], title: "CVE-2024-56337", }, { cve: "CVE-2025-21553", references: [ { category: "self", summary: "CVE-2025-21553", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21553.json", }, ], title: "CVE-2025-21553", }, { cve: "CVE-2025-21557", product_status: { known_affected: [ "CSAFPID-1503575", "CSAFPID-1673188", ], }, references: [ { category: "self", summary: "CVE-2025-21557", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21557.json", }, ], scores: [ { cvss_v3: { baseScore: 5.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "CSAFPID-1503575", "CSAFPID-1673188", ], }, ], title: "CVE-2025-21557", }, { cve: "CVE-2022-26345", cwe: { id: "CWE-427", name: "Uncontrolled Search Path Element", }, notes: [ { category: "other", text: "Uncontrolled Search Path Element", title: "CWE-427", }, ], product_status: { known_affected: [ "CSAFPID-1751199", "CSAFPID-1751200", ], }, references: [ { category: "self", summary: "CVE-2022-26345", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-26345.json", }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-1751199", "CSAFPID-1751200", ], }, ], title: "CVE-2022-26345", }, { cve: "CVE-2023-27043", cwe: { id: "CWE-20", name: "Improper Input Validation", }, notes: [ { category: "other", text: "Improper Input Validation", title: "CWE-20", }, ], references: [ { category: "self", summary: "CVE-2023-27043", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-27043.json", }, ], title: "CVE-2023-27043", }, { cve: "CVE-2023-36730", cwe: { id: "CWE-20", name: "Improper Input Validation", }, notes: [ { category: "other", text: "Improper Input Validation", title: "CWE-20", }, { category: "other", text: "Heap-based Buffer Overflow", title: "CWE-122", }, ], product_status: { known_affected: [ "CSAFPID-1751203", "CSAFPID-1751204", ], }, references: [ { category: "self", summary: "CVE-2023-36730", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-36730.json", }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-1751203", "CSAFPID-1751204", ], }, ], title: "CVE-2023-36730", }, { cve: "CVE-2023-36785", cwe: { id: "CWE-191", name: "Integer Underflow (Wrap or Wraparound)", }, notes: [ { category: "other", text: "Integer Underflow (Wrap or Wraparound)", title: "CWE-191", }, { category: "other", text: "Improper Input Validation", title: "CWE-20", }, ], product_status: { known_affected: [ "CSAFPID-1751203", "CSAFPID-1751204", ], }, references: [ { category: "self", summary: "CVE-2023-36785", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-36785.json", }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-1751203", "CSAFPID-1751204", ], }, ], title: "CVE-2023-36785", }, { cve: "CVE-2023-48795", cwe: { id: "CWE-222", name: "Truncation of Security-relevant Information", }, notes: [ { category: "other", text: "Truncation of Security-relevant Information", title: "CWE-222", }, { category: "other", text: "Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade')", title: "CWE-757", }, { category: "other", text: "Improper Validation of Integrity Check Value", title: "CWE-354", }, ], product_status: { known_affected: [ "CSAFPID-1650765", "CSAFPID-1650767", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-711746", "CSAFPID-816845", "CSAFPID-1503575", "CSAFPID-1503604", "CSAFPID-1751212", ], }, references: [ { category: "self", summary: "CVE-2023-48795", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-48795.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-1650765", "CSAFPID-1650767", "CSAFPID-342816", "CSAFPID-667692", "CSAFPID-711746", "CSAFPID-816845", "CSAFPID-1503575", "CSAFPID-1503604", "CSAFPID-1751212", ], }, ], title: "CVE-2023-48795", }, { cve: "CVE-2023-52428", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, notes: [ { category: "other", text: "Uncontrolled Resource Consumption", title: "CWE-400", }, { category: "other", text: "Allocation of Resources Without Limits or Throttling", title: "CWE-770", }, ], product_status: { known_affected: [ "CSAFPID-342816", "CSAFPID-1503575", "CSAFPID-1503604", "CSAFPID-816845", "CSAFPID-711746", "CSAFPID-1751216", ], }, references: [ { category: "self", summary: "CVE-2023-52428", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52428.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-342816", "CSAFPID-1503575", "CSAFPID-1503604", "CSAFPID-816845", "CSAFPID-711746", "CSAFPID-1751216", ], }, ], title: "CVE-2023-52428", }, { cve: "CVE-2024-2961", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, notes: [ { category: "other", text: "Out-of-bounds Write", title: "CWE-787", }, ], product_status: { known_affected: [ "CSAFPID-1503575", "CSAFPID-1503604", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-711746", ], }, references: [ { category: "self", summary: "CVE-2024-2961", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2961.json", }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-1503575", "CSAFPID-1503604", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-711746", ], }, ], title: "CVE-2024-2961", }, { cve: "CVE-2024-4030", cwe: { id: "CWE-276", name: "Incorrect Default Permissions", }, notes: [ { category: "other", text: "Incorrect Default Permissions", title: "CWE-276", }, ], references: [ { category: "self", summary: "CVE-2024-4030", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4030.json", }, ], title: "CVE-2024-4030", }, { cve: "CVE-2024-4032", cwe: { id: "CWE-440", name: "Expected Behavior Violation", }, notes: [ { category: "other", text: "Expected Behavior Violation", title: "CWE-440", }, ], references: [ { category: "self", summary: "CVE-2024-4032", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4032.json", }, ], title: "CVE-2024-4032", }, { cve: "CVE-2024-6232", cwe: { id: "CWE-1333", name: "Inefficient Regular Expression Complexity", }, notes: [ { category: "other", text: "Inefficient Regular Expression Complexity", title: "CWE-1333", }, ], references: [ { category: "self", summary: "CVE-2024-6232", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6232.json", }, ], title: "CVE-2024-6232", }, { cve: "CVE-2024-6763", cwe: { id: "CWE-1286", name: "Improper Validation of Syntactic Correctness of Input", }, notes: [ { category: "other", text: "Improper Validation of Syntactic Correctness of Input", title: "CWE-1286", }, ], product_status: { known_affected: [ "CSAFPID-1751304", "CSAFPID-1751305", ], }, references: [ { category: "self", summary: "CVE-2024-6763", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6763.json", }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, products: [ "CSAFPID-1751304", "CSAFPID-1751305", ], }, ], title: "CVE-2024-6763", }, { cve: "CVE-2024-6923", cwe: { id: "CWE-502", name: "Deserialization of Untrusted Data", }, notes: [ { category: "other", text: "Deserialization of Untrusted Data", title: "CWE-502", }, { category: "other", text: "Improper Control of Generation of Code ('Code Injection')", title: "CWE-94", }, ], references: [ { category: "self", summary: "CVE-2024-6923", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6923.json", }, ], title: "CVE-2024-6923", }, { cve: "CVE-2024-7254", cwe: { id: "CWE-20", name: "Improper Input Validation", }, notes: [ { category: "other", text: "Improper Input Validation", title: "CWE-20", }, { category: "other", text: "Uncontrolled Recursion", title: "CWE-674", }, ], references: [ { category: "self", summary: "CVE-2024-7254", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7254.json", }, ], title: "CVE-2024-7254", }, { cve: "CVE-2024-7592", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, notes: [ { category: "other", text: "Uncontrolled Resource Consumption", title: "CWE-400", }, ], references: [ { category: "self", summary: "CVE-2024-7592", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7592.json", }, ], title: "CVE-2024-7592", }, { cve: "CVE-2024-8088", cwe: { id: "CWE-835", name: "Loop with Unreachable Exit Condition ('Infinite Loop')", }, notes: [ { category: "other", text: "Loop with Unreachable Exit Condition ('Infinite Loop')", title: "CWE-835", }, ], references: [ { category: "self", summary: "CVE-2024-8088", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-8088.json", }, ], title: "CVE-2024-8088", }, { cve: "CVE-2024-8927", cwe: { id: "CWE-284", name: "Improper Access Control", }, notes: [ { category: "other", text: "Improper Access Control", title: "CWE-284", }, { category: "other", text: "Insufficient Granularity of Access Control", title: "CWE-1220", }, ], product_status: { known_affected: [ "CSAFPID-1673422", "CSAFPID-345049", "CSAFPID-611417", ], }, references: [ { category: "self", summary: "CVE-2024-8927", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-8927.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "CSAFPID-1673422", "CSAFPID-345049", "CSAFPID-611417", ], }, ], title: "CVE-2024-8927", }, { cve: "CVE-2024-11053", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, notes: [ { category: "other", text: "Exposure of Sensitive Information to an Unauthorized Actor", title: "CWE-200", }, ], references: [ { category: "self", summary: "CVE-2024-11053", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-11053.json", }, ], title: "CVE-2024-11053", }, { cve: "CVE-2024-21211", cwe: { id: "CWE-922", name: "Insecure Storage of Sensitive Information", }, notes: [ { category: "other", text: "Insecure Storage of Sensitive Information", title: "CWE-922", }, ], product_status: { known_affected: [ "CSAFPID-1751223", "CSAFPID-1751224", ], }, references: [ { category: "self", summary: "CVE-2024-21211", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21211.json", }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, products: [ "CSAFPID-1751223", "CSAFPID-1751224", ], }, ], title: "CVE-2024-21211", }, { cve: "CVE-2024-22262", cwe: { id: "CWE-601", name: "URL Redirection to Untrusted Site ('Open Redirect')", }, notes: [ { category: "other", text: "URL Redirection to Untrusted Site ('Open Redirect')", title: "CWE-601", }, ], product_status: { known_affected: [ "CSAFPID-1650825", "CSAFPID-1503575", "CSAFPID-1503604", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-711746", ], }, references: [ { category: "self", summary: "CVE-2024-22262", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22262.json", }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "CSAFPID-1650825", "CSAFPID-1503575", "CSAFPID-1503604", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-711746", ], }, ], title: "CVE-2024-22262", }, { cve: "CVE-2024-24789", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, notes: [ { category: "other", text: "Exposure of Sensitive Information to an Unauthorized Actor", title: "CWE-200", }, { category: "other", text: "Improper Input Validation", title: "CWE-20", }, { category: "other", text: "Improper Validation of Specified Type of Input", title: "CWE-1287", }, ], references: [ { category: "self", summary: "CVE-2024-24789", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24789.json", }, ], title: "CVE-2024-24789", }, { cve: "CVE-2024-24790", cwe: { id: "CWE-284", name: "Improper Access Control", }, notes: [ { category: "other", text: "Improper Access Control", title: "CWE-284", }, { category: "other", text: "Misinterpretation of Input", title: "CWE-115", }, { category: "other", text: "Improper Validation of Specified Type of Input", title: "CWE-1287", }, ], references: [ { category: "self", summary: "CVE-2024-24790", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24790.json", }, ], title: "CVE-2024-24790", }, { cve: "CVE-2024-24791", cwe: { id: "CWE-404", name: "Improper Resource Shutdown or Release", }, notes: [ { category: "other", text: "Improper Resource Shutdown or Release", title: "CWE-404", }, { category: "other", text: "Improper Input Validation", title: "CWE-20", }, ], references: [ { category: "self", summary: "CVE-2024-24791", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24791.json", }, ], title: "CVE-2024-24791", }, { cve: "CVE-2024-28757", cwe: { id: "CWE-611", name: "Improper Restriction of XML External Entity Reference", }, notes: [ { category: "other", text: "Improper Restriction of XML External Entity Reference", title: "CWE-611", }, { category: "other", text: "Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')", title: "CWE-776", }, { category: "other", text: "Improper Input Validation", title: "CWE-20", }, ], product_status: { known_affected: [ "CSAFPID-1503575", "CSAFPID-1503604", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-711746", ], }, references: [ { category: "self", summary: "CVE-2024-28757", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28757.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-1503575", "CSAFPID-1503604", "CSAFPID-342816", "CSAFPID-816845", "CSAFPID-711746", ], }, ], title: "CVE-2024-28757", }, { cve: "CVE-2024-33599", cwe: { id: "CWE-119", name: "Improper Restriction of Operations within the Bounds of a Memory Buffer", }, notes: [ { category: "other", text: "Improper Restriction of Operations within the Bounds of a Memory Buffer", title: "CWE-119", }, { category: "other", text: "Stack-based Buffer Overflow", title: "CWE-121", }, ], references: [ { category: "self", summary: "CVE-2024-33599", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33599.json", }, ], title: "CVE-2024-33599", }, { cve: "CVE-2024-33600", cwe: { id: "CWE-476", name: "NULL Pointer Dereference", }, notes: [ { category: "other", text: "NULL Pointer Dereference", title: "CWE-476", }, ], references: [ { category: "self", summary: "CVE-2024-33600", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33600.json", }, ], title: "CVE-2024-33600", }, { cve: "CVE-2024-33601", cwe: { id: "CWE-703", name: "Improper Check or Handling of Exceptional Conditions", }, notes: [ { category: "other", text: "Improper Check or Handling of Exceptional Conditions", title: "CWE-703", }, { category: "other", text: "Reachable Assertion", title: "CWE-617", }, ], references: [ { category: "self", summary: "CVE-2024-33601", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33601.json", }, ], title: "CVE-2024-33601", }, { cve: "CVE-2024-33602", cwe: { id: "CWE-466", name: "Return of Pointer Value Outside of Expected Range", }, notes: [ { category: "other", text: "Return of Pointer Value Outside of Expected Range", title: "CWE-466", }, { category: "other", text: "Improper Check or Handling of Exceptional Conditions", title: "CWE-703", }, ], references: [ { category: "self", summary: "CVE-2024-33602", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33602.json", }, ], title: "CVE-2024-33602", }, { cve: "CVE-2024-38819", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, notes: [ { category: "other", text: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", title: "CWE-22", }, ], product_status: { known_affected: [ "CSAFPID-1650825", ], }, references: [ { category: "self", summary: "CVE-2024-38819", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38819.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "CSAFPID-1650825", ], }, ], title: "CVE-2024-38819", }, { cve: "CVE-2024-38820", cwe: { id: "CWE-284", name: "Improper Access Control", }, notes: [ { category: "other", text: "Improper Access Control", title: "CWE-284", }, { category: "other", text: "Improper Handling of Case Sensitivity", title: "CWE-178", }, ], product_status: { known_affected: [ "CSAFPID-1650825", ], }, references: [ { category: "self", summary: "CVE-2024-38820", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38820.json", }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-1650825", ], }, ], title: "CVE-2024-38820", }, ], }
ncsc-2025-0021
Vulnerability from csaf_ncscnl
Notes
{ document: { category: "csaf_security_advisory", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", }, }, lang: "nl", notes: [ { category: "legal_disclaimer", text: "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.", }, { category: "description", text: "Oracle heeft meerdere kwetsbaarheden verholpen in zijn Communicatieproducten, waaronder Oracle Communications Unified Assurance, Oracle Communications Cloud Native Core Network Function en Oracle Communications Order and Service Management.", title: "Feiten", }, { category: "description", text: "De kwetsbaarheden stellen ongeauthenticeerde kwaadwillenden in staat om Denial of Service (DoS) aanvallen uit te voeren of om ongeautoriseerde toegang tot gevoelige gegevens te verkrijgen. Specifieke versies, zoals 24.2.0 en 24.3.0 van de Cloud Native Core Network Function, zijn bijzonder kwetsbaar. Kwaadwillenden kunnen deze kwetsbaarheden misbruiken door speciaal geprepareerde HTTP-verzoeken te sturen naar het kwetsbare systeem.", title: "Interpretaties", }, { category: "description", text: "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.", title: "Oplossingen", }, { category: "general", text: "medium", title: "Kans", }, { category: "general", text: "high", title: "Schade", }, { category: "general", text: "Dependency on Vulnerable Third-Party Component", title: "CWE-1395", }, { category: "general", text: "Always-Incorrect Control Flow Implementation", title: "CWE-670", }, { category: "general", text: "Asymmetric Resource Consumption (Amplification)", title: "CWE-405", }, { category: "general", text: "Path Traversal: '.../...//'", title: "CWE-35", }, { category: "general", text: "Return of Pointer Value Outside of Expected Range", title: "CWE-466", }, { category: "general", text: "Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)", title: "CWE-338", }, { category: "general", text: "Use of Potentially Dangerous Function", title: "CWE-676", }, { category: "general", text: "Unchecked Input for Loop Condition", title: "CWE-606", }, { category: "general", text: "Multiple Interpretations of UI Input", title: "CWE-450", }, { category: "general", text: "Incorrect Calculation of Buffer Size", title: "CWE-131", }, { category: "general", text: "Use of Weak Hash", title: "CWE-328", }, { category: "general", text: "Improper Handling of Length Parameter Inconsistency", title: "CWE-130", }, { category: "general", text: "Incorrect Resource Transfer Between Spheres", title: "CWE-669", }, { category: "general", text: "Insufficient Granularity of Access Control", title: "CWE-1220", }, { category: "general", text: "Insertion of Sensitive Information Into Sent Data", title: "CWE-201", }, { category: "general", text: "Acceptance of Extraneous Untrusted Data With Trusted Data", title: "CWE-349", }, { category: "general", text: "Improper Handling of Exceptional Conditions", title: "CWE-755", }, { category: "general", text: "Improper Verification of Cryptographic Signature", title: "CWE-347", }, { category: "general", text: "Excessive Iteration", title: "CWE-834", }, { category: "general", text: "Improper Handling of Case Sensitivity", title: "CWE-178", }, { category: "general", text: "Time-of-check Time-of-use (TOCTOU) Race Condition", title: "CWE-367", }, { category: "general", text: "Expected Behavior Violation", title: "CWE-440", }, { category: "general", text: "Double Free", title: "CWE-415", }, { category: "general", text: "Missing Encryption of Sensitive Data", title: "CWE-311", }, { category: "general", text: "Improper Enforcement of Message Integrity During Transmission in a Communication Channel", title: "CWE-924", }, { category: "general", text: "Improper Check for Unusual or Exceptional Conditions", title: "CWE-754", }, { category: "general", text: "Improper Check or Handling of Exceptional Conditions", title: "CWE-703", }, { category: "general", text: "Reachable Assertion", title: "CWE-617", }, { category: "general", text: "Uncontrolled Search Path Element", title: "CWE-427", }, { category: "general", text: "Use of Password Hash Instead of Password for Authentication", title: "CWE-836", }, { category: "general", text: "Integer Overflow to Buffer Overflow", title: "CWE-680", }, { category: "general", text: "Access of Resource Using Incompatible Type ('Type Confusion')", title: "CWE-843", }, { category: "general", text: "Relative Path Traversal", title: "CWE-23", }, { category: "general", text: "Improper Encoding or Escaping of Output", title: "CWE-116", }, { category: "general", text: "Insufficient Verification of Data Authenticity", title: "CWE-345", }, { category: "general", text: "Observable Discrepancy", title: "CWE-203", }, { category: "general", text: "Improper Validation of Integrity Check Value", title: "CWE-354", }, { category: "general", text: "Missing Cryptographic Step", title: "CWE-325", }, { category: "general", text: "Integer Overflow or Wraparound", title: "CWE-190", }, { category: "general", text: "User Interface (UI) Misrepresentation of Critical Information", title: "CWE-451", }, { category: "general", text: "UNIX Symbolic Link (Symlink) Following", title: "CWE-61", }, { category: "general", text: "Files or Directories Accessible to External Parties", title: "CWE-552", }, { category: "general", text: "Authorization Bypass Through User-Controlled Key", title: "CWE-639", }, { category: "general", text: "Use of Hard-coded Credentials", title: "CWE-798", }, { category: "general", text: "Unrestricted Upload of File with Dangerous Type", title: "CWE-434", }, { category: "general", text: "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", title: "CWE-362", }, { category: "general", text: "Improper Resource Shutdown or Release", title: "CWE-404", }, { category: "general", text: "Improper Access Control", title: "CWE-284", }, { category: "general", text: "Improper Restriction of Operations within the Bounds of a Memory Buffer", title: "CWE-119", }, { category: "general", text: "Inefficient Regular Expression Complexity", title: "CWE-1333", }, { category: "general", text: "Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')", title: "CWE-1321", }, { category: "general", text: "Use After Free", title: "CWE-416", }, { category: "general", text: "NULL Pointer Dereference", title: "CWE-476", }, { category: "general", text: "Use of a Broken or Risky Cryptographic Algorithm", title: "CWE-327", }, { category: "general", text: "Uncontrolled Resource Consumption", title: "CWE-400", }, { category: "general", text: "Allocation of Resources Without Limits or Throttling", title: "CWE-770", }, { category: "general", text: "Deserialization of Untrusted Data", title: "CWE-502", }, { category: "general", text: "Uncaught Exception", title: "CWE-248", }, { category: "general", text: "Uncontrolled Recursion", title: "CWE-674", }, { category: "general", text: "Incorrect Authorization", title: "CWE-863", }, { category: "general", text: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", title: "CWE-22", }, { category: "general", text: "Improper Restriction of XML External Entity Reference", title: "CWE-611", }, { category: "general", text: "Out-of-bounds Write", title: "CWE-787", }, { category: "general", text: "Exposure of Sensitive Information to an Unauthorized Actor", title: "CWE-200", }, { category: "general", text: "Heap-based Buffer Overflow", title: "CWE-122", }, { category: "general", text: "Stack-based Buffer Overflow", title: "CWE-121", }, { category: "general", text: "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')", title: "CWE-120", }, { category: "general", text: "Loop with Unreachable Exit Condition ('Infinite Loop')", title: "CWE-835", }, { category: "general", text: "Improper Privilege Management", title: "CWE-269", }, { category: "general", text: "Improper Input Validation", title: "CWE-20", }, { category: "general", text: "Generation of Error Message Containing Sensitive Information", title: "CWE-209", }, { category: "general", text: "Incorrect Default Permissions", title: "CWE-276", }, { category: "general", text: "Authentication Bypass by Capture-replay", title: "CWE-294", }, { category: "general", text: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", title: "CWE-79", }, ], publisher: { category: "coordinator", contact_details: "cert@ncsc.nl", name: "Nationaal Cyber Security Centrum", namespace: "https://www.ncsc.nl/", }, references: [ { category: "external", summary: "Reference - cveprojectv5; nvd; oracle", url: "https://www.oracle.com/security-alerts/cpujan2025.html", }, ], title: "Kwetsbaarheden verholpen in Oracle Communications", tracking: { current_release_date: "2025-01-22T13:30:50.189632Z", id: "NCSC-2025-0021", initial_release_date: "2025-01-22T13:30:50.189632Z", revision_history: [ { date: "2025-01-22T13:30:50.189632Z", number: "0", summary: "Initiele versie", }, ], status: "final", version: "1.0.0", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1727475", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1635313", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:10.5:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1635305", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:12.11.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1635311", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:12.11.3:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1635312", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:12.11.4:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1635323", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:12.6.1.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1670430", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:14.0.0.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1674632", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:14.0.0.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1674630", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:14.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1635320", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:15.0.0.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1674633", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:17.0.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1670439", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:22.4.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1635322", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:23.1.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1670429", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:23.2.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1670435", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:23.2.2:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1670431", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:23.3.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1670436", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:23.3.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1670432", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:23.3.2:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1635321", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:23.4.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1635310", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:23.4.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1635318", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:23.4.2:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1674640", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:23.4.3:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1674642", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:23.4.4:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1670434", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:24.1.0.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1635316", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:24.1.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1674639", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:24.1.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1635314", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:24.2.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1674638", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:24.2.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1674637", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:24.2.2:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1635306", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:4.1.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1635307", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:4.2.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1635317", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:46.6.4:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1635319", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:46.6.5:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1670438", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:5.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1635324", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:5.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1635315", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:5.2:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1670433", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:9.0.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1674641", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:9.0.1.10.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1674635", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:9.1.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1674636", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:9.1.1.3.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1670437", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:9.1.1.7.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1674631", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:9.1.1.9.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1674634", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:9.1.5:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1635308", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:9.2.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications", product: { name: "communications", product_id: "CSAFPID-1635309", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications:9.3.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications__10.4.0.4", product: { name: "communications__10.4.0.4", product_id: "CSAFPID-1674629", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications__10.4.0.4:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications___23.4.2", product: { name: "communications___23.4.2", product_id: "CSAFPID-1670442", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications___23.4.2:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications___23.4.3", product: { name: "communications___23.4.3", product_id: "CSAFPID-1635325", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications___23.4.3:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications___23.4.4", product: { name: "communications___23.4.4", product_id: "CSAFPID-1635326", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications___23.4.4:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications___23.4.5", product: { name: "communications___23.4.5", product_id: "CSAFPID-1674645", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications___23.4.5:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications___23.4.6", product: { name: "communications___23.4.6", product_id: "CSAFPID-1674646", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications___23.4.6:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications___24.2.0", product: { name: "communications___24.2.0", product_id: "CSAFPID-1674644", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications___24.2.0:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications___7.2.1.0.0", product: { name: "communications___7.2.1.0.0", product_id: "CSAFPID-1670441", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications___7.2.1.0.0:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications___8.6.0.6", product: { name: "communications___8.6.0.6", product_id: "CSAFPID-1635327", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications___8.6.0.6:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications___8.6.0.8", product: { name: "communications___8.6.0.8", product_id: "CSAFPID-1635328", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications___8.6.0.8:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications___9.0.2", product: { name: "communications___9.0.2", product_id: "CSAFPID-1670440", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications___9.0.2:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications___9.0.3", product: { name: "communications___9.0.3", product_id: "CSAFPID-1635329", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications___9.0.3:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications___9.1.1.8.0", product: { name: "communications___9.1.1.8.0", product_id: "CSAFPID-1674643", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications___9.1.1.8.0:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_applications", product: { name: "communications_applications", product_id: "CSAFPID-1751386", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_applications:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_applications", product: { name: "communications_applications", product_id: "CSAFPID-1674621", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_applications:15.0.0.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_applications", product: { name: "communications_applications", product_id: "CSAFPID-1751381", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_applications:15.0.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_applications", product: { name: "communications_applications", product_id: "CSAFPID-1751383", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_applications:15.0.1.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_applications", product: { name: "communications_applications", product_id: "CSAFPID-1751378", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_applications:3.0.2.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_applications", product: { name: "communications_applications", product_id: "CSAFPID-1751377", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_applications:3.0.3.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_applications", product: { name: "communications_applications", product_id: "CSAFPID-1751385", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_applications:3.0.3.3.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_applications", product: { name: "communications_applications", product_id: "CSAFPID-1674618", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_applications:6.0.1.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_applications", product: { name: "communications_applications", product_id: "CSAFPID-1674619", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_applications:7.4.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_applications", product: { name: "communications_applications", product_id: "CSAFPID-1674622", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_applications:7.4.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_applications", product: { name: "communications_applications", product_id: "CSAFPID-1751384", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_applications:7.4.2:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_applications", product: { name: "communications_applications", product_id: "CSAFPID-1674617", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_applications:7.4.3.0.2:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_applications", product: { name: "communications_applications", product_id: "CSAFPID-1674623", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_applications:7.5.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_applications", product: { name: "communications_applications", product_id: "CSAFPID-1751382", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_applications:8.0.0.3:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_applications", product: { name: "communications_applications", product_id: "CSAFPID-1751380", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_applications:8.1.0.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_applications", product: { name: "communications_applications", product_id: "CSAFPID-1751379", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_applications:8.1.0.26:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_applications", product: { name: "communications_applications", product_id: "CSAFPID-1674620", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_applications:8.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_applications___12.0.6.0.0", product: { name: "communications_applications___12.0.6.0.0", product_id: "CSAFPID-1674627", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_applications___12.0.6.0.0:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_applications___5.5.22", product: { name: "communications_applications___5.5.22", product_id: "CSAFPID-1674626", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_applications___5.5.22:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_applications___6.0.3", product: { name: "communications_applications___6.0.3", product_id: "CSAFPID-1674628", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_applications___6.0.3:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_applications___6.0.4", product: { name: "communications_applications___6.0.4", product_id: "CSAFPID-1674624", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_applications___6.0.4:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_applications___6.0.5", product: { name: "communications_applications___6.0.5", product_id: "CSAFPID-1674625", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_applications___6.0.5:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_asap", product: { name: "communications_asap", product_id: "CSAFPID-816792", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_asap:7.4:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_billing_and_revenue_management", product: { name: "communications_billing_and_revenue_management", product_id: "CSAFPID-764735", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_billing_and_revenue_management:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_billing_and_revenue_management", product: { name: "communications_billing_and_revenue_management", product_id: "CSAFPID-1751255", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.4-12.0.0.8:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_billing_and_revenue_management", product: { name: "communications_billing_and_revenue_management", product_id: "CSAFPID-1751254", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0-15.0.0.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_billing_and_revenue_management", product: { name: "communications_billing_and_revenue_management", product_id: "CSAFPID-816793", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_billing_and_revenue_management", product: { name: "communications_billing_and_revenue_management", product_id: "CSAFPID-912557", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_brm_-_elastic_charging_engine", product: { name: "communications_brm_-_elastic_charging_engine", product_id: "CSAFPID-764247", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_brm_-_elastic_charging_engine", product: { name: "communications_brm_-_elastic_charging_engine", product_id: "CSAFPID-1650820", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:12.0.0.4-12.0.0.8:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_brm_-_elastic_charging_engine", product: { name: "communications_brm_-_elastic_charging_engine", product_id: "CSAFPID-912556", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:15.0.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_brm_-_elastic_charging_engine", product: { name: "communications_brm_-_elastic_charging_engine", product_id: "CSAFPID-1751303", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:15.0.1.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_automated_test_suite", product: { name: "communications_cloud_native_core_automated_test_suite", product_id: "CSAFPID-220055", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.1.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_automated_test_suite", product: { name: "communications_cloud_native_core_automated_test_suite", product_id: "CSAFPID-816765", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.1.3:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_automated_test_suite", product: { name: "communications_cloud_native_core_automated_test_suite", product_id: "CSAFPID-816766", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.2.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_automated_test_suite", product: { name: "communications_cloud_native_core_automated_test_suite", product_id: "CSAFPID-816767", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.3.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_automated_test_suite", product: { name: "communications_cloud_native_core_automated_test_suite", product_id: "CSAFPID-1503577", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.4.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_automated_test_suite", product: { name: "communications_cloud_native_core_automated_test_suite", product_id: "CSAFPID-1751300", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:24.2.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_binding_support_function", product: { name: "communications_cloud_native_core_binding_support_function", product_id: "CSAFPID-764237", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_binding_support_function", product: { name: "communications_cloud_native_core_binding_support_function", product_id: "CSAFPID-1650752", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.0-23.4.3:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_binding_support_function", product: { name: "communications_cloud_native_core_binding_support_function", product_id: "CSAFPID-1673396", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.0-23.4.5:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_binding_support_function", product: { name: "communications_cloud_native_core_binding_support_function", product_id: "CSAFPID-1751085", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:24.2.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_binding_support_function", product: { name: "communications_cloud_native_core_binding_support_function", product_id: "CSAFPID-1751079", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:24.2.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_certificate_management", product: { name: "communications_cloud_native_core_certificate_management", product_id: "CSAFPID-1673526", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:23.4.2:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_certificate_management", product: { name: "communications_cloud_native_core_certificate_management", product_id: "CSAFPID-1673391", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:23.4.3:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_certificate_management", product: { name: "communications_cloud_native_core_certificate_management", product_id: "CSAFPID-1673394", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:24.2.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_certificate_management", product: { name: "communications_cloud_native_core_certificate_management", product_id: "CSAFPID-1751253", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:24.2.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_console", product: { name: "communications_cloud_native_core_console", product_id: "CSAFPID-816768", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.3.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_console", product: { name: "communications_cloud_native_core_console", product_id: "CSAFPID-816769", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.3.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_console", product: { name: "communications_cloud_native_core_console", product_id: "CSAFPID-912085", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.4.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_console", product: { name: "communications_cloud_native_core_console", product_id: "CSAFPID-1503578", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.4.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_console", product: { name: "communications_cloud_native_core_console", product_id: "CSAFPID-1673389", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.4.2:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_console", product: { name: "communications_cloud_native_core_console", product_id: "CSAFPID-1673390", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_console:24.2.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_console", product: { name: "communications_cloud_native_core_console", product_id: "CSAFPID-1751090", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_console:24.2.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_dbtier", product: { name: "communications_cloud_native_core_dbtier", product_id: "CSAFPID-1673421", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.1.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_dbtier", product: { name: "communications_cloud_native_core_dbtier", product_id: "CSAFPID-1673420", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.2.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_dbtier", product: { name: "communications_cloud_native_core_dbtier", product_id: "CSAFPID-1751246", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.3.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_network_data_analytics_function", product: { name: "communications_cloud_native_core_network_data_analytics_function", product_id: "CSAFPID-816770", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:23.3.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_network_data_analytics_function", product: { name: "communications_cloud_native_core_network_data_analytics_function", product_id: "CSAFPID-816771", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:23.4.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_network_data_analytics_function", product: { name: "communications_cloud_native_core_network_data_analytics_function", product_id: "CSAFPID-912068", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:24.1.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_network_data_analytics_function", product: { name: "communications_cloud_native_core_network_data_analytics_function", product_id: "CSAFPID-1503579", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:24.2.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_network_exposure_function", product: { name: "communications_cloud_native_core_network_exposure_function", product_id: "CSAFPID-816772", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.3.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_network_exposure_function", product: { name: "communications_cloud_native_core_network_exposure_function", product_id: "CSAFPID-912076", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.4.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_network_exposure_function", product: { name: "communications_cloud_native_core_network_exposure_function", product_id: "CSAFPID-1503580", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.4.3:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_network_function_cloud_native_environment", product: { name: "communications_cloud_native_core_network_function_cloud_native_environment", product_id: "CSAFPID-219838", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.1.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_network_function_cloud_native_environment", product: { name: "communications_cloud_native_core_network_function_cloud_native_environment", product_id: "CSAFPID-611387", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.2.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_network_function_cloud_native_environment", product: { name: "communications_cloud_native_core_network_function_cloud_native_environment", product_id: "CSAFPID-816773", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.3.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_network_function_cloud_native_environment", product: { name: "communications_cloud_native_core_network_function_cloud_native_environment", product_id: "CSAFPID-912101", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.4.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_network_function_cloud_native_environment", product: { name: "communications_cloud_native_core_network_function_cloud_native_environment", product_id: "CSAFPID-1503581", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.1.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_network_function_cloud_native_environment", product: { name: "communications_cloud_native_core_network_function_cloud_native_environment", product_id: "CSAFPID-1751208", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.2.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_network_function_cloud_native_environment", product: { name: "communications_cloud_native_core_network_function_cloud_native_environment", product_id: "CSAFPID-1751209", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.3.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_network_function_cloud_native_environment", product: { name: "communications_cloud_native_core_network_function_cloud_native_environment", product_id: "CSAFPID-912539", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_install_upgrade___23.3.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_network_function_cloud_native_environment", product: { name: "communications_cloud_native_core_network_function_cloud_native_environment", product_id: "CSAFPID-912540", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_install_upgrade___23.4.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_network_function_cloud_native_environment", product: { name: "communications_cloud_native_core_network_function_cloud_native_environment", product_id: "CSAFPID-912541", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_installation___23.4.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_network_function_cloud_native_environment", product: { name: "communications_cloud_native_core_network_function_cloud_native_environment", product_id: "CSAFPID-912542", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_obserability_services_overlay___23.4.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_network_function_cloud_native_environment", product: { name: "communications_cloud_native_core_network_function_cloud_native_environment", product_id: "CSAFPID-912543", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_observability_services_overlay___23.4.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_network_repository_function", product: { name: "communications_cloud_native_core_network_repository_function", product_id: "CSAFPID-816774", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.1.4:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_network_repository_function", product: { name: "communications_cloud_native_core_network_repository_function", product_id: "CSAFPID-816346", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.3.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_network_repository_function", product: { name: "communications_cloud_native_core_network_repository_function", product_id: "CSAFPID-912077", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.4.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_network_repository_function", product: { name: "communications_cloud_native_core_network_repository_function", product_id: "CSAFPID-1503322", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.4.2:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_network_repository_function", product: { name: "communications_cloud_native_core_network_repository_function", product_id: "CSAFPID-1673413", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.4.4:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_network_repository_function", product: { name: "communications_cloud_native_core_network_repository_function", product_id: "CSAFPID-1673415", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:24.2.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_network_repository_function", product: { name: "communications_cloud_native_core_network_repository_function", product_id: "CSAFPID-1751231", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:24.2.2:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_network_repository_function", product: { name: "communications_cloud_native_core_network_repository_function", product_id: "CSAFPID-816775", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:_install_upgrade___23.3.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_network_repository_function", product: { name: "communications_cloud_native_core_network_repository_function", product_id: "CSAFPID-912544", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:_install_upgrade___23.4.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_network_slice_selection_function", product: { name: "communications_cloud_native_core_network_slice_selection_function", product_id: "CSAFPID-816348", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:23.2.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_network_slice_selection_function", product: { name: "communications_cloud_native_core_network_slice_selection_function", product_id: "CSAFPID-912545", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:23.3.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_network_slice_selection_function", product: { name: "communications_cloud_native_core_network_slice_selection_function", product_id: "CSAFPID-816347", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:23.3.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_network_slice_selection_function", product: { name: "communications_cloud_native_core_network_slice_selection_function", product_id: "CSAFPID-1673494", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:24.2.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_network_slice_selection_function", product: { name: "communications_cloud_native_core_network_slice_selection_function", product_id: "CSAFPID-816776", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:_install_upgrade___23.2.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_network_slice_selection_function", product: { name: "communications_cloud_native_core_network_slice_selection_function", product_id: "CSAFPID-816777", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:_install_upgrade___23.3.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_policy", product: { name: "communications_cloud_native_core_policy", product_id: "CSAFPID-764240", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_policy:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_policy", product: { name: "communications_cloud_native_core_policy", product_id: "CSAFPID-1650751", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.4:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_policy", product: { name: "communications_cloud_native_core_policy", product_id: "CSAFPID-1673517", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.5:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_policy", product: { name: "communications_cloud_native_core_policy", product_id: "CSAFPID-1673395", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.6:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_policy", product: { name: "communications_cloud_native_core_policy", product_id: "CSAFPID-912069", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_policy", product: { name: "communications_cloud_native_core_policy", product_id: "CSAFPID-1751225", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_policy:24.2.0-24.2.2:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_policy", product: { name: "communications_cloud_native_core_policy", product_id: "CSAFPID-1751088", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_policy:24.2.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_policy", product: { name: "communications_cloud_native_core_policy", product_id: "CSAFPID-1751089", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_policy:24.2.2:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_security_edge_protection_proxy", product: { name: "communications_cloud_native_core_security_edge_protection_proxy", product_id: "CSAFPID-94291", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.1.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_security_edge_protection_proxy", product: { name: "communications_cloud_native_core_security_edge_protection_proxy", product_id: "CSAFPID-816778", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.2.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_security_edge_protection_proxy", product: { name: "communications_cloud_native_core_security_edge_protection_proxy", product_id: "CSAFPID-614517", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.3.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_security_edge_protection_proxy", product: { name: "communications_cloud_native_core_security_edge_protection_proxy", product_id: "CSAFPID-912547", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.4.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_security_edge_protection_proxy", product: { name: "communications_cloud_native_core_security_edge_protection_proxy", product_id: "CSAFPID-1673392", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.4.2:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_security_edge_protection_proxy", product: { name: "communications_cloud_native_core_security_edge_protection_proxy", product_id: "CSAFPID-1503582", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.1.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_security_edge_protection_proxy", product: { name: "communications_cloud_native_core_security_edge_protection_proxy", product_id: "CSAFPID-1673393", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_security_edge_protection_proxy", product: { name: "communications_cloud_native_core_security_edge_protection_proxy", product_id: "CSAFPID-1751081", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_security_edge_protection_proxy", product: { name: "communications_cloud_native_core_security_edge_protection_proxy", product_id: "CSAFPID-1751084", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.2:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_security_edge_protection_proxy", product: { name: "communications_cloud_native_core_security_edge_protection_proxy", product_id: "CSAFPID-912546", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:_automated_test_suite___23.3.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_service_communication_proxy", product: { name: "communications_cloud_native_core_service_communication_proxy", product_id: "CSAFPID-224795", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.1.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_service_communication_proxy", product: { name: "communications_cloud_native_core_service_communication_proxy", product_id: "CSAFPID-912548", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.2.2:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_service_communication_proxy", product: { name: "communications_cloud_native_core_service_communication_proxy", product_id: "CSAFPID-912102", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.3.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_service_communication_proxy", product: { name: "communications_cloud_native_core_service_communication_proxy", product_id: "CSAFPID-912549", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.4.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_service_communication_proxy", product: { name: "communications_cloud_native_core_service_communication_proxy", product_id: "CSAFPID-1503583", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.4.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_service_communication_proxy", product: { name: "communications_cloud_native_core_service_communication_proxy", product_id: "CSAFPID-1503584", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.4.2:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_service_communication_proxy", product: { name: "communications_cloud_native_core_service_communication_proxy", product_id: "CSAFPID-1503585", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.1.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_service_communication_proxy", product: { name: "communications_cloud_native_core_service_communication_proxy", product_id: "CSAFPID-1672767", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.2.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_service_communication_proxy", product: { name: "communications_cloud_native_core_service_communication_proxy", product_id: "CSAFPID-1751241", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.3.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_unified_data_repository", product: { name: "communications_cloud_native_core_unified_data_repository", product_id: "CSAFPID-764826", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.4.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_unified_data_repository", product: { name: "communications_cloud_native_core_unified_data_repository", product_id: "CSAFPID-90016", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.1.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_unified_data_repository", product: { name: "communications_cloud_native_core_unified_data_repository", product_id: "CSAFPID-912078", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.2.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_unified_data_repository", product: { name: "communications_cloud_native_core_unified_data_repository", product_id: "CSAFPID-816349", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.3.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_unified_data_repository", product: { name: "communications_cloud_native_core_unified_data_repository", product_id: "CSAFPID-912550", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.3.2:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_unified_data_repository", product: { name: "communications_cloud_native_core_unified_data_repository", product_id: "CSAFPID-1503586", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.4.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_unified_data_repository", product: { name: "communications_cloud_native_core_unified_data_repository", product_id: "CSAFPID-1503587", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.4.2:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_unified_data_repository", product: { name: "communications_cloud_native_core_unified_data_repository", product_id: "CSAFPID-1751238", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.4.4:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_unified_data_repository", product: { name: "communications_cloud_native_core_unified_data_repository", product_id: "CSAFPID-1751240", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.1.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_unified_data_repository", product: { name: "communications_cloud_native_core_unified_data_repository", product_id: "CSAFPID-1673399", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.2.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_unified_data_repository", product: { name: "communications_cloud_native_core_unified_data_repository", product_id: "CSAFPID-1751239", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.2.2:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_unified_data_repository", product: { name: "communications_cloud_native_core_unified_data_repository", product_id: "CSAFPID-1751080", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.2.3:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_unified_data_repository", product: { name: "communications_cloud_native_core_unified_data_repository", product_id: "CSAFPID-1751082", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.3.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_cloud_native_core_unified_data_repository", product: { name: "communications_cloud_native_core_unified_data_repository", product_id: "CSAFPID-816779", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:_signaling___23.3.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_converged_application_server", product: { name: "communications_converged_application_server", product_id: "CSAFPID-1751229", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_converged_application_server:8.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_converged_application_server", product: { name: "communications_converged_application_server", product_id: "CSAFPID-1751230", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_converged_application_server:8.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_converged_charging_system", product: { name: "communications_converged_charging_system", product_id: "CSAFPID-1503599", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_converged_charging_system:2.0.0.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_converged_charging_system", product: { name: "communications_converged_charging_system", product_id: "CSAFPID-1503600", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_converged_charging_system:2.0.0.1.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_convergence", product: { name: "communications_convergence", product_id: "CSAFPID-1751292", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_convergence:3.0.2.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_convergence", product: { name: "communications_convergence", product_id: "CSAFPID-1751294", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_convergence:3.0.3.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_convergence", product: { name: "communications_convergence", product_id: "CSAFPID-224793", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_convergence:3.0.3.2:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_convergence", product: { name: "communications_convergence", product_id: "CSAFPID-1751295", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_convergence:3.0.3.3.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_convergence", product: { name: "communications_convergence", product_id: "CSAFPID-816794", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_convergence:3.0.3.3:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_convergent_charging_controller", product: { name: "communications_convergent_charging_controller", product_id: "CSAFPID-342793", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_convergent_charging_controller:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_convergent_charging_controller", product: { name: "communications_convergent_charging_controller", product_id: "CSAFPID-1650777", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_convergent_charging_controller:12.0.1.0.0-12.0.6.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_convergent_charging_controller", product: { name: "communications_convergent_charging_controller", product_id: "CSAFPID-1265", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_convergent_charging_controller:12.0.6.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_convergent_charging_controller", product: { name: "communications_convergent_charging_controller", product_id: "CSAFPID-816350", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_convergent_charging_controller:15.0.0.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_convergent_charging_controller", product: { name: "communications_convergent_charging_controller", product_id: "CSAFPID-1261", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_convergent_charging_controller:6.0.1.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_core_session_manager", product: { name: "communications_core_session_manager", product_id: "CSAFPID-1672764", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_core_session_manager:9.1.5:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_diameter_signaling_router", product: { name: "communications_diameter_signaling_router", product_id: "CSAFPID-1503588", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_diameter_signaling_router", product: { name: "communications_diameter_signaling_router", product_id: "CSAFPID-1751104", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.2.3.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_diameter_signaling_router", product: { name: "communications_diameter_signaling_router", product_id: "CSAFPID-40293", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.6.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_diameter_signaling_router", product: { name: "communications_diameter_signaling_router", product_id: "CSAFPID-1751242", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.6.0.4.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_diameter_signaling_router", product: { name: "communications_diameter_signaling_router", product_id: "CSAFPID-1751237", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_diameter_signaling_router:9.0.0.0.0-9.0.2.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_diameter_signaling_router", product: { name: "communications_diameter_signaling_router", product_id: "CSAFPID-1751097", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_diameter_signaling_router:9.0.0.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_diameter_signaling_router", product: { name: "communications_diameter_signaling_router", product_id: "CSAFPID-611413", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_diameter_signaling_router:9.0.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_diameter_signaling_router", product: { name: "communications_diameter_signaling_router", product_id: "CSAFPID-1751211", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_diameter_signaling_router:9.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_diameter_signaling_router", product: { name: "communications_diameter_signaling_router", product_id: "CSAFPID-912551", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_diameter_signaling_router:_patches___9.0.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_diameter_signaling_router", product: { name: "communications_diameter_signaling_router", product_id: "CSAFPID-912552", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_diameter_signaling_router:_platform___9.0.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_eagle_element_management_system", product: { name: "communications_eagle_element_management_system", product_id: "CSAFPID-1503316", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_eagle_element_management_system:46.6.4:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_eagle_element_management_system", product: { name: "communications_eagle_element_management_system", product_id: "CSAFPID-1503317", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_eagle_element_management_system:46.6.5:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_eagle_element_management_system", product: { name: "communications_eagle_element_management_system", product_id: "CSAFPID-1751243", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_eagle_element_management_system:47.0.0.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_element_manager", product: { name: "communications_element_manager", product_id: "CSAFPID-764242", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_element_manager:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_element_manager", product: { name: "communications_element_manager", product_id: "CSAFPID-819413", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_element_manager:9.0.0.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_element_manager", product: { name: "communications_element_manager", product_id: "CSAFPID-819414", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_element_manager:9.0.2.0.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_element_manager", product: { name: "communications_element_manager", product_id: "CSAFPID-816780", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_element_manager:9.4.53:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_fraud_monitor", product: { name: "communications_fraud_monitor", product_id: "CSAFPID-816781", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_fraud_monitor:5.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_fraud_monitor", product: { name: "communications_fraud_monitor", product_id: "CSAFPID-816782", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_fraud_monitor:5.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_fraud_monitor", product: { name: "communications_fraud_monitor", product_id: "CSAFPID-912553", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_fraud_monitor:5.2:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_instant_messaging_server", product: { name: "communications_instant_messaging_server", product_id: "CSAFPID-219803", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.7.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_ip_service_activator", product: { name: "communications_ip_service_activator", product_id: "CSAFPID-204622", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_ip_service_activator:7.4.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_ip_service_activator", product: { name: "communications_ip_service_activator", product_id: "CSAFPID-219909", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_ip_service_activator:7.5.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_messaging_server", product: { name: "communications_messaging_server", product_id: "CSAFPID-816351", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_messaging_server:8.1.0.24.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_messaging_server", product: { name: "communications_messaging_server", product_id: "CSAFPID-1751218", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_messaging_server:8.1.0.26:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_metasolv_solution", product: { name: "communications_metasolv_solution", product_id: "CSAFPID-611595", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_metasolv_solution:6.3.1.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_network_analytics_data_director", product: { name: "communications_network_analytics_data_director", product_id: "CSAFPID-816353", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.2.0.0.2:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_network_analytics_data_director", product: { name: "communications_network_analytics_data_director", product_id: "CSAFPID-816352", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.3.0.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_network_analytics_data_director", product: { name: "communications_network_analytics_data_director", product_id: "CSAFPID-1503589", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.4.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_network_analytics_data_director", product: { name: "communications_network_analytics_data_director", product_id: "CSAFPID-1503590", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.1.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_network_analytics_data_director", product: { name: "communications_network_analytics_data_director", product_id: "CSAFPID-1673414", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.2.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_network_analytics_data_director", product: { name: "communications_network_analytics_data_director", product_id: "CSAFPID-816783", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_network_analytics_data_director:_general___23.2.0.0.2:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_network_analytics_data_director", product: { name: "communications_network_analytics_data_director", product_id: "CSAFPID-816786", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_network_analytics_data_director:_general___23.3.0.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_network_analytics_data_director", product: { name: "communications_network_analytics_data_director", product_id: "CSAFPID-816784", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_network_analytics_data_director:_install_upgrade___23.2.0.0.2:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_network_analytics_data_director", product: { name: "communications_network_analytics_data_director", product_id: "CSAFPID-816787", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_network_analytics_data_director:_install_upgrade___23.3.0.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_network_analytics_data_director", product: { name: "communications_network_analytics_data_director", product_id: "CSAFPID-816785", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_network_analytics_data_director:_third_party___23.2.0.0.2:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_network_analytics_data_director", product: { name: "communications_network_analytics_data_director", product_id: "CSAFPID-816788", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_network_analytics_data_director:_third_party___23.3.0.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_network_charging_and_control", product: { name: "communications_network_charging_and_control", product_id: "CSAFPID-342803", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_network_charging_and_control:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_network_charging_and_control", product: { name: "communications_network_charging_and_control", product_id: "CSAFPID-1650778", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.1.0.0-12.0.6.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_network_charging_and_control", product: { name: "communications_network_charging_and_control", product_id: "CSAFPID-1266", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.6.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_network_charging_and_control", product: { name: "communications_network_charging_and_control", product_id: "CSAFPID-816354", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_network_charging_and_control:15.0.0.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_network_charging_and_control", product: { name: "communications_network_charging_and_control", product_id: "CSAFPID-204563", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_network_charging_and_control:6.0.1.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_network_integrity", product: { name: "communications_network_integrity", product_id: "CSAFPID-219776", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_network_integrity:7.3.6.4:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_offline_mediation_controller", product: { name: "communications_offline_mediation_controller", product_id: "CSAFPID-765242", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_offline_mediation_controller:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_offline_mediation_controller", product: { name: "communications_offline_mediation_controller", product_id: "CSAFPID-916906", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_offline_mediation_controller:12.0.0.8:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_offline_mediation_controller", product: { name: "communications_offline_mediation_controller", product_id: "CSAFPID-1751247", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_offline_mediation_controller:15.0.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_offline_mediation_controller", product: { name: "communications_offline_mediation_controller", product_id: "CSAFPID-1751248", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_offline_mediation_controller:15.0.1.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_operations_monitor", product: { name: "communications_operations_monitor", product_id: "CSAFPID-93781", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_operations_monitor:5.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_operations_monitor", product: { name: "communications_operations_monitor", product_id: "CSAFPID-220132", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_operations_monitor:5.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_operations_monitor", product: { name: "communications_operations_monitor", product_id: "CSAFPID-912079", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_operations_monitor:5.2:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_order_and_service_management", product: { name: "communications_order_and_service_management", product_id: "CSAFPID-224790", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_order_and_service_management:7.4.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_order_and_service_management", product: { name: "communications_order_and_service_management", product_id: "CSAFPID-221118", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_order_and_service_management:7.4.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_order_and_service_management", product: { name: "communications_order_and_service_management", product_id: "CSAFPID-1673496", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_order_and_service_management:7.5.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_performance_intelligence", product: { name: "communications_performance_intelligence", product_id: "CSAFPID-1503591", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_performance_intelligence:10.5:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_policy_management", product: { name: "communications_policy_management", product_id: "CSAFPID-816789", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_policy_management:12.6.1.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_policy_management", product: { name: "communications_policy_management", product_id: "CSAFPID-816790", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_policy_management:15.0.0.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_pricing_design_center", product: { name: "communications_pricing_design_center", product_id: "CSAFPID-764738", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_pricing_design_center:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_pricing_design_center", product: { name: "communications_pricing_design_center", product_id: "CSAFPID-816355", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_pricing_design_center:15.0.0.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_service_catalog_and_design", product: { name: "communications_service_catalog_and_design", product_id: "CSAFPID-1503601", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_service_catalog_and_design:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_service_catalog_and_design", product: { name: "communications_service_catalog_and_design", product_id: "CSAFPID-816359", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_service_catalog_and_design:7.4.0.7.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_service_catalog_and_design", product: { name: "communications_service_catalog_and_design", product_id: "CSAFPID-816358", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_service_catalog_and_design:7.4.1.5.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_service_catalog_and_design", product: { name: "communications_service_catalog_and_design", product_id: "CSAFPID-816357", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_service_catalog_and_design:7.4.2.8.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_service_catalog_and_design", product: { name: "communications_service_catalog_and_design", product_id: "CSAFPID-912558", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.0.0.1.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_service_catalog_and_design", product: { name: "communications_service_catalog_and_design", product_id: "CSAFPID-1751233", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.0.0.3:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_service_catalog_and_design", product: { name: "communications_service_catalog_and_design", product_id: "CSAFPID-1503602", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_service_catalog_and_design", product: { name: "communications_service_catalog_and_design", product_id: "CSAFPID-1751234", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.1.0.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_service_catalog_and_design", product: { name: "communications_service_catalog_and_design", product_id: "CSAFPID-816795", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_service_catalog_and_design:_psr_designer___7.4.0.7.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_service_catalog_and_design", product: { name: "communications_service_catalog_and_design", product_id: "CSAFPID-816796", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_service_catalog_and_design:_psr_designer___7.4.1.5.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_service_catalog_and_design", product: { name: "communications_service_catalog_and_design", product_id: "CSAFPID-816797", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_service_catalog_and_design:_psr_designer___7.4.2.8.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_session_border_controller", product: { name: "communications_session_border_controller", product_id: "CSAFPID-1503592", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_session_border_controller:4.1.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_session_border_controller", product: { name: "communications_session_border_controller", product_id: "CSAFPID-1503593", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_session_border_controller:4.2.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_session_border_controller", product: { name: "communications_session_border_controller", product_id: "CSAFPID-1672762", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_session_border_controller:9.1.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_session_border_controller", product: { name: "communications_session_border_controller", product_id: "CSAFPID-1503594", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_session_border_controller:9.2.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_session_border_controller", product: { name: "communications_session_border_controller", product_id: "CSAFPID-1503595", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_session_border_controller:9.3.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_session_report_manager", product: { name: "communications_session_report_manager", product_id: "CSAFPID-342804", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_session_report_manager", product: { name: "communications_session_report_manager", product_id: "CSAFPID-819415", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_session_report_manager:9.0.0.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_session_report_manager", product: { name: "communications_session_report_manager", product_id: "CSAFPID-819416", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_session_report_manager:9.0.2.0.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_session_report_manager", product: { name: "communications_session_report_manager", product_id: "CSAFPID-816791", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_session_report_manager:9.4.53:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_unified_assurance", product: { name: "communications_unified_assurance", product_id: "CSAFPID-240600", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_unified_assurance:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_unified_assurance", product: { name: "communications_unified_assurance", product_id: "CSAFPID-1673382", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_unified_assurance:5.5.0-5.5.22:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_unified_assurance", product: { name: "communications_unified_assurance", product_id: "CSAFPID-1650731", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0-6.0.4:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_unified_assurance", product: { name: "communications_unified_assurance", product_id: "CSAFPID-1673530", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0-6.0.5:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_unified_assurance", product: { name: "communications_unified_assurance", product_id: "CSAFPID-1751235", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_unified_assurance:6.0.1-6.0.5:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_unified_assurance", product: { name: "communications_unified_assurance", product_id: "CSAFPID-1751296", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_unified_assurance:6.0.4-6.0.5:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_unified_inventory_management", product: { name: "communications_unified_inventory_management", product_id: "CSAFPID-764739", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_unified_inventory_management:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_unified_inventory_management", product: { name: "communications_unified_inventory_management", product_id: "CSAFPID-8984", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_unified_inventory_management", product: { name: "communications_unified_inventory_management", product_id: "CSAFPID-204510", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_unified_inventory_management", product: { name: "communications_unified_inventory_management", product_id: "CSAFPID-204569", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.2:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_unified_inventory_management", product: { name: "communications_unified_inventory_management", product_id: "CSAFPID-219826", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_unified_inventory_management:7.5.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_unified_inventory_management", product: { name: "communications_unified_inventory_management", product_id: "CSAFPID-912073", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_unified_inventory_management:7.5.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_user_data_repository", product: { name: "communications_user_data_repository", product_id: "CSAFPID-1503596", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_user_data_repository:12.11.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_user_data_repository", product: { name: "communications_user_data_repository", product_id: "CSAFPID-1503597", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_user_data_repository:12.11.3:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_user_data_repository", product: { name: "communications_user_data_repository", product_id: "CSAFPID-1503598", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_user_data_repository:12.11.4:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_user_data_repository", product: { name: "communications_user_data_repository", product_id: "CSAFPID-1751217", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_user_data_repository:12.11:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_user_data_repository", product: { name: "communications_user_data_repository", product_id: "CSAFPID-912080", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_user_data_repository:14.0.0.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_user_data_repository", product: { name: "communications_user_data_repository", product_id: "CSAFPID-1673481", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_user_data_repository:14.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_user_data_repository", product: { name: "communications_user_data_repository", product_id: "CSAFPID-1751258", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_user_data_repository:15.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "communications_webrtc_session_controller", product: { name: "communications_webrtc_session_controller", product_id: "CSAFPID-912554", product_identification_helper: { cpe: "cpe:2.3:a:oracle:communications_webrtc_session_controller:*:*:*:*:*:*:*:*", }, }, }, ], category: "vendor", name: "oracle", }, ], }, vulnerabilities: [ { cve: "CVE-2022-41727", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, notes: [ { category: "other", text: "Uncontrolled Resource Consumption", title: "CWE-400", }, { category: "other", text: "Allocation of Resources Without Limits or Throttling", title: "CWE-770", }, ], product_status: { known_affected: [ "CSAFPID-1673530", ], }, references: [ { category: "self", summary: "CVE-2022-41727", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-41727.json", }, ], title: "CVE-2022-41727", }, { cve: "CVE-2023-4408", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, notes: [ { category: "other", text: "Uncontrolled Resource Consumption", title: "CWE-400", }, ], references: [ { category: "self", summary: "CVE-2023-4408", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4408.json", }, ], title: "CVE-2023-4408", }, { cve: "CVE-2023-5678", cwe: { id: "CWE-754", name: "Improper Check for Unusual or Exceptional Conditions", }, notes: [ { category: "other", text: "Improper Check for Unusual or Exceptional Conditions", title: "CWE-754", }, { category: "other", text: "Missing Cryptographic Step", title: "CWE-325", }, { category: "other", text: "Unchecked Input for Loop Condition", title: "CWE-606", }, { category: "other", text: "Improper Input Validation", title: "CWE-20", }, ], product_status: { known_affected: [ "CSAFPID-764237", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-611387", "CSAFPID-816773", "CSAFPID-816348", "CSAFPID-764240", "CSAFPID-614517", "CSAFPID-224795", "CSAFPID-764826", "CSAFPID-90016", "CSAFPID-611413", "CSAFPID-764242", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-93781", "CSAFPID-220132", "CSAFPID-342804", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-219776", "CSAFPID-765242", "CSAFPID-764739", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219826", "CSAFPID-912073", "CSAFPID-912101", "CSAFPID-912102", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-912077", "CSAFPID-912078", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912085", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", ], }, references: [ { category: "self", summary: "CVE-2023-5678", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5678.json", }, ], title: "CVE-2023-5678", }, { cve: "CVE-2023-5981", cwe: { id: "CWE-203", name: "Observable Discrepancy", }, notes: [ { category: "other", text: "Observable Discrepancy", title: "CWE-203", }, ], product_status: { known_affected: [ "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1751217", "CSAFPID-1673481", ], }, references: [ { category: "self", summary: "CVE-2023-5981", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5981.json", }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1751217", "CSAFPID-1673481", ], }, ], title: "CVE-2023-5981", }, { cve: "CVE-2023-6597", cwe: { id: "CWE-61", name: "UNIX Symbolic Link (Symlink) Following", }, notes: [ { category: "other", text: "UNIX Symbolic Link (Symlink) Following", title: "CWE-61", }, ], product_status: { known_affected: [ "CSAFPID-1673395", "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1673396", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1751097", ], }, references: [ { category: "self", summary: "CVE-2023-6597", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-6597.json", }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N", version: "3.1", }, products: [ "CSAFPID-1673395", "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1673396", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1751097", ], }, ], title: "CVE-2023-6597", }, { cve: "CVE-2023-7256", cwe: { id: "CWE-415", name: "Double Free", }, notes: [ { category: "other", text: "Double Free", title: "CWE-415", }, ], product_status: { known_affected: [ "CSAFPID-220132", "CSAFPID-1751084", "CSAFPID-912079", ], }, references: [ { category: "self", summary: "CVE-2023-7256", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-7256.json", }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-220132", "CSAFPID-1751084", "CSAFPID-912079", ], }, ], title: "CVE-2023-7256", }, { cve: "CVE-2023-29407", cwe: { id: "CWE-834", name: "Excessive Iteration", }, notes: [ { category: "other", text: "Excessive Iteration", title: "CWE-834", }, ], product_status: { known_affected: [ "CSAFPID-1673530", ], }, references: [ { category: "self", summary: "CVE-2023-29407", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-29407.json", }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-1673530", ], }, ], title: "CVE-2023-29407", }, { cve: "CVE-2023-29408", cwe: { id: "CWE-770", name: "Allocation of Resources Without Limits or Throttling", }, notes: [ { category: "other", text: "Allocation of Resources Without Limits or Throttling", title: "CWE-770", }, ], product_status: { known_affected: [ "CSAFPID-1673530", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, references: [ { category: "self", summary: "CVE-2023-29408", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-29408.json", }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-1673530", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, ], title: "CVE-2023-29408", }, { cve: "CVE-2023-40577", cwe: { id: "CWE-79", name: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", }, notes: [ { category: "other", text: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", title: "CWE-79", }, ], product_status: { known_affected: [ "CSAFPID-1751208", "CSAFPID-1751209", ], }, references: [ { category: "self", summary: "CVE-2023-40577", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-40577.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "CSAFPID-1751208", "CSAFPID-1751209", ], }, ], title: "CVE-2023-40577", }, { cve: "CVE-2023-46218", cwe: { id: "CWE-201", name: "Insertion of Sensitive Information Into Sent Data", }, notes: [ { category: "other", text: "Insertion of Sensitive Information Into Sent Data", title: "CWE-201", }, { category: "other", text: "Improper Input Validation", title: "CWE-20", }, ], product_status: { known_affected: [ "CSAFPID-90016", "CSAFPID-93781", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219776", "CSAFPID-219826", "CSAFPID-220132", "CSAFPID-224795", "CSAFPID-342804", "CSAFPID-611387", "CSAFPID-611413", "CSAFPID-614517", "CSAFPID-764237", "CSAFPID-764240", "CSAFPID-764242", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764739", "CSAFPID-764826", "CSAFPID-765242", "CSAFPID-816348", "CSAFPID-816773", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-912068", "CSAFPID-912073", "CSAFPID-912076", "CSAFPID-912077", "CSAFPID-912078", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912085", "CSAFPID-912101", "CSAFPID-912102", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-1751211", ], }, references: [ { category: "self", summary: "CVE-2023-46218", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46218.json", }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "CSAFPID-90016", "CSAFPID-93781", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219776", "CSAFPID-219826", "CSAFPID-220132", "CSAFPID-224795", "CSAFPID-342804", "CSAFPID-611387", "CSAFPID-611413", "CSAFPID-614517", "CSAFPID-764237", "CSAFPID-764240", "CSAFPID-764242", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764739", "CSAFPID-764826", "CSAFPID-765242", "CSAFPID-816348", "CSAFPID-816773", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-912068", "CSAFPID-912073", "CSAFPID-912076", "CSAFPID-912077", "CSAFPID-912078", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912085", "CSAFPID-912101", "CSAFPID-912102", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-1751211", ], }, ], title: "CVE-2023-46218", }, { cve: "CVE-2023-46219", cwe: { id: "CWE-311", name: "Missing Encryption of Sensitive Data", }, notes: [ { category: "other", text: "Missing Encryption of Sensitive Data", title: "CWE-311", }, ], product_status: { known_affected: [ "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-611387", "CSAFPID-912539", "CSAFPID-816773", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912101", "CSAFPID-912544", "CSAFPID-912077", "CSAFPID-816348", "CSAFPID-912545", "CSAFPID-764240", "CSAFPID-912546", "CSAFPID-614517", "CSAFPID-912547", "CSAFPID-224795", "CSAFPID-912548", "CSAFPID-912102", "CSAFPID-912549", "CSAFPID-764826", "CSAFPID-90016", "CSAFPID-912078", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-611413", "CSAFPID-764242", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-912553", "CSAFPID-93781", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219776", "CSAFPID-219826", "CSAFPID-220132", "CSAFPID-342804", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764739", "CSAFPID-765242", "CSAFPID-912073", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-1751211", ], }, references: [ { category: "self", summary: "CVE-2023-46219", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46219.json", }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-611387", "CSAFPID-912539", "CSAFPID-816773", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912101", "CSAFPID-912544", "CSAFPID-912077", "CSAFPID-816348", "CSAFPID-912545", "CSAFPID-764240", "CSAFPID-912546", "CSAFPID-614517", "CSAFPID-912547", "CSAFPID-224795", "CSAFPID-912548", "CSAFPID-912102", "CSAFPID-912549", "CSAFPID-764826", "CSAFPID-90016", "CSAFPID-912078", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-611413", "CSAFPID-764242", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-912553", "CSAFPID-93781", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219776", "CSAFPID-219826", "CSAFPID-220132", "CSAFPID-342804", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764739", "CSAFPID-765242", "CSAFPID-912073", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-1751211", ], }, ], title: "CVE-2023-46219", }, { cve: "CVE-2023-46604", cwe: { id: "CWE-502", name: "Deserialization of Untrusted Data", }, notes: [ { category: "other", text: "Deserialization of Untrusted Data", title: "CWE-502", }, ], product_status: { known_affected: [ "CSAFPID-94291", "CSAFPID-40293", "CSAFPID-1265", "CSAFPID-1261", "CSAFPID-1266", "CSAFPID-8984", "CSAFPID-764237", "CSAFPID-764240", "CSAFPID-224795", "CSAFPID-764826", "CSAFPID-90016", "CSAFPID-93781", "CSAFPID-220132", "CSAFPID-219776", "CSAFPID-765242", "CSAFPID-764739", "CSAFPID-219826", "CSAFPID-204510", "CSAFPID-204563", "CSAFPID-204569", "CSAFPID-204622", "CSAFPID-219803", "CSAFPID-219838", "CSAFPID-219909", "CSAFPID-221118", "CSAFPID-224790", "CSAFPID-224793", "CSAFPID-240600", "CSAFPID-342793", "CSAFPID-342803", "CSAFPID-342804", "CSAFPID-611387", "CSAFPID-611413", "CSAFPID-611595", "CSAFPID-614517", "CSAFPID-764242", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764738", "CSAFPID-816346", "CSAFPID-816347", "CSAFPID-816348", "CSAFPID-816349", "CSAFPID-816350", "CSAFPID-816351", "CSAFPID-816352", "CSAFPID-816353", "CSAFPID-816354", "CSAFPID-816355", "CSAFPID-816357", "CSAFPID-816358", "CSAFPID-816359", "CSAFPID-816765", "CSAFPID-816766", "CSAFPID-816767", "CSAFPID-816768", "CSAFPID-816769", "CSAFPID-816770", "CSAFPID-816771", "CSAFPID-816772", "CSAFPID-816773", "CSAFPID-816774", "CSAFPID-816775", "CSAFPID-816776", "CSAFPID-816777", "CSAFPID-816778", "CSAFPID-816779", "CSAFPID-816780", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-816783", "CSAFPID-816784", "CSAFPID-816785", "CSAFPID-816786", "CSAFPID-816787", "CSAFPID-816788", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-816791", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-816794", "CSAFPID-816795", "CSAFPID-816796", "CSAFPID-816797", "CSAFPID-912068", "CSAFPID-912073", "CSAFPID-912076", "CSAFPID-912077", "CSAFPID-912078", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912085", "CSAFPID-912101", "CSAFPID-912102", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-1751104", ], }, references: [ { category: "self", summary: "CVE-2023-46604", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46604.json", }, ], scores: [ { cvss_v3: { baseScore: 10, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-94291", "CSAFPID-40293", "CSAFPID-1265", "CSAFPID-1261", "CSAFPID-1266", "CSAFPID-8984", "CSAFPID-764237", "CSAFPID-764240", "CSAFPID-224795", "CSAFPID-764826", "CSAFPID-90016", "CSAFPID-93781", "CSAFPID-220132", "CSAFPID-219776", "CSAFPID-765242", "CSAFPID-764739", "CSAFPID-219826", "CSAFPID-204510", "CSAFPID-204563", "CSAFPID-204569", "CSAFPID-204622", "CSAFPID-219803", "CSAFPID-219838", "CSAFPID-219909", "CSAFPID-221118", "CSAFPID-224790", "CSAFPID-224793", "CSAFPID-240600", "CSAFPID-342793", "CSAFPID-342803", "CSAFPID-342804", "CSAFPID-611387", "CSAFPID-611413", "CSAFPID-611595", "CSAFPID-614517", "CSAFPID-764242", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764738", "CSAFPID-816346", "CSAFPID-816347", "CSAFPID-816348", "CSAFPID-816349", "CSAFPID-816350", "CSAFPID-816351", "CSAFPID-816352", "CSAFPID-816353", "CSAFPID-816354", "CSAFPID-816355", "CSAFPID-816357", "CSAFPID-816358", "CSAFPID-816359", "CSAFPID-816765", "CSAFPID-816766", "CSAFPID-816767", "CSAFPID-816768", "CSAFPID-816769", "CSAFPID-816770", "CSAFPID-816771", "CSAFPID-816772", "CSAFPID-816773", "CSAFPID-816774", "CSAFPID-816775", "CSAFPID-816776", "CSAFPID-816777", "CSAFPID-816778", "CSAFPID-816779", "CSAFPID-816780", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-816783", "CSAFPID-816784", "CSAFPID-816785", "CSAFPID-816786", "CSAFPID-816787", "CSAFPID-816788", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-816791", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-816794", "CSAFPID-816795", "CSAFPID-816796", "CSAFPID-816797", "CSAFPID-912068", "CSAFPID-912073", "CSAFPID-912076", "CSAFPID-912077", "CSAFPID-912078", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912085", "CSAFPID-912101", "CSAFPID-912102", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-1751104", ], }, ], title: "CVE-2023-46604", }, { cve: "CVE-2023-50868", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, notes: [ { category: "other", text: "Uncontrolled Resource Consumption", title: "CWE-400", }, ], references: [ { category: "self", summary: "CVE-2023-50868", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-50868.json", }, ], title: "CVE-2023-50868", }, { cve: "CVE-2024-0232", cwe: { id: "CWE-416", name: "Use After Free", }, notes: [ { category: "other", text: "Use After Free", title: "CWE-416", }, ], product_status: { known_affected: [ "CSAFPID-1650777", "CSAFPID-1650778", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1751218", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, references: [ { category: "self", summary: "CVE-2024-0232", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0232.json", }, ], title: "CVE-2024-0232", }, { cve: "CVE-2024-0397", product_status: { known_affected: [ "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1673530", ], }, references: [ { category: "self", summary: "CVE-2024-0397", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0397.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1673530", ], }, ], title: "CVE-2024-0397", }, { cve: "CVE-2024-0450", cwe: { id: "CWE-450", name: "Multiple Interpretations of UI Input", }, notes: [ { category: "other", text: "Multiple Interpretations of UI Input", title: "CWE-450", }, { category: "other", text: "Asymmetric Resource Consumption (Amplification)", title: "CWE-405", }, ], product_status: { known_affected: [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1727475", "CSAFPID-1751097", ], }, references: [ { category: "self", summary: "CVE-2024-0450", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0450.json", }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1727475", "CSAFPID-1751097", ], }, ], title: "CVE-2024-0450", }, { cve: "CVE-2024-1442", cwe: { id: "CWE-269", name: "Improper Privilege Management", }, notes: [ { category: "other", text: "Improper Privilege Management", title: "CWE-269", }, ], product_status: { known_affected: [ "CSAFPID-1673530", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, references: [ { category: "self", summary: "CVE-2024-1442", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-1442.json", }, ], scores: [ { cvss_v3: { baseScore: 6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L", version: "3.1", }, products: [ "CSAFPID-1673530", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, ], title: "CVE-2024-1442", }, { cve: "CVE-2024-2961", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, notes: [ { category: "other", text: "Out-of-bounds Write", title: "CWE-787", }, ], product_status: { known_affected: [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1672762", "CSAFPID-1672764", "CSAFPID-1672767", "CSAFPID-1673396", "CSAFPID-1673395", "CSAFPID-1673494", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1727475", "CSAFPID-1751097", "CSAFPID-1751237", ], }, references: [ { category: "self", summary: "CVE-2024-2961", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2961.json", }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1672762", "CSAFPID-1672764", "CSAFPID-1672767", "CSAFPID-1673396", "CSAFPID-1673395", "CSAFPID-1673494", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1727475", "CSAFPID-1751097", "CSAFPID-1751237", ], }, ], title: "CVE-2024-2961", }, { cve: "CVE-2024-3596", cwe: { id: "CWE-924", name: "Improper Enforcement of Message Integrity During Transmission in a Communication Channel", }, notes: [ { category: "other", text: "Improper Enforcement of Message Integrity During Transmission in a Communication Channel", title: "CWE-924", }, { category: "other", text: "Use of Weak Hash", title: "CWE-328", }, { category: "other", text: "Authentication Bypass by Capture-replay", title: "CWE-294", }, { category: "other", text: "Use of Password Hash Instead of Password for Authentication", title: "CWE-836", }, { category: "other", text: "Use of a Broken or Risky Cryptographic Algorithm", title: "CWE-327", }, { category: "other", text: "User Interface (UI) Misrepresentation of Critical Information", title: "CWE-451", }, { category: "other", text: "Improper Validation of Integrity Check Value", title: "CWE-354", }, ], product_status: { known_affected: [ "CSAFPID-1751090", "CSAFPID-912079", "CSAFPID-220132", "CSAFPID-1751253", ], }, references: [ { category: "self", summary: "CVE-2024-3596", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-3596.json", }, ], scores: [ { cvss_v3: { baseScore: 9, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-1751090", "CSAFPID-912079", "CSAFPID-220132", "CSAFPID-1751253", ], }, ], title: "CVE-2024-3596", }, { cve: "CVE-2024-4030", cwe: { id: "CWE-276", name: "Incorrect Default Permissions", }, notes: [ { category: "other", text: "Incorrect Default Permissions", title: "CWE-276", }, ], product_status: { known_affected: [ "CSAFPID-1673530", ], }, references: [ { category: "self", summary: "CVE-2024-4030", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4030.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-1673530", ], }, ], title: "CVE-2024-4030", }, { cve: "CVE-2024-4032", cwe: { id: "CWE-440", name: "Expected Behavior Violation", }, notes: [ { category: "other", text: "Expected Behavior Violation", title: "CWE-440", }, ], product_status: { known_affected: [ "CSAFPID-1673530", ], }, references: [ { category: "self", summary: "CVE-2024-4032", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4032.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "CSAFPID-1673530", ], }, ], title: "CVE-2024-4032", }, { cve: "CVE-2024-5535", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, notes: [ { category: "other", text: "Exposure of Sensitive Information to an Unauthorized Actor", title: "CWE-200", }, { category: "other", text: "Improper Restriction of Operations within the Bounds of a Memory Buffer", title: "CWE-119", }, { category: "other", text: "Dependency on Vulnerable Third-Party Component", title: "CWE-1395", }, ], product_status: { known_affected: [ "CSAFPID-1751090", "CSAFPID-1751253", ], }, references: [ { category: "self", summary: "CVE-2024-5535", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5535.json", }, ], scores: [ { cvss_v3: { baseScore: 9.1, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-1751090", "CSAFPID-1751253", ], }, ], title: "CVE-2024-5535", }, { cve: "CVE-2024-6119", cwe: { id: "CWE-843", name: "Access of Resource Using Incompatible Type ('Type Confusion')", }, notes: [ { category: "other", text: "Access of Resource Using Incompatible Type ('Type Confusion')", title: "CWE-843", }, ], product_status: { known_affected: [ "CSAFPID-1751209", ], }, references: [ { category: "self", summary: "CVE-2024-6119", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6119.json", }, ], scores: [ { cvss_v3: { baseScore: 9.1, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-1751209", ], }, ], title: "CVE-2024-6119", }, { cve: "CVE-2024-6162", cwe: { id: "CWE-404", name: "Improper Resource Shutdown or Release", }, notes: [ { category: "other", text: "Improper Resource Shutdown or Release", title: "CWE-404", }, { category: "other", text: "Uncontrolled Resource Consumption", title: "CWE-400", }, ], product_status: { known_affected: [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650752", "CSAFPID-1650751", "CSAFPID-1673526", "CSAFPID-1673399", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1727475", "CSAFPID-1751303", "CSAFPID-1650820", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, references: [ { category: "self", summary: "CVE-2024-6162", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6162.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650752", "CSAFPID-1650751", "CSAFPID-1673526", "CSAFPID-1673399", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1727475", "CSAFPID-1751303", "CSAFPID-1650820", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, ], title: "CVE-2024-6162", }, { cve: "CVE-2024-6232", cwe: { id: "CWE-1333", name: "Inefficient Regular Expression Complexity", }, notes: [ { category: "other", text: "Inefficient Regular Expression Complexity", title: "CWE-1333", }, ], product_status: { known_affected: [ "CSAFPID-1673530", ], }, references: [ { category: "self", summary: "CVE-2024-6232", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6232.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-1673530", ], }, ], title: "CVE-2024-6232", }, { cve: "CVE-2024-7254", cwe: { id: "CWE-20", name: "Improper Input Validation", }, notes: [ { category: "other", text: "Improper Input Validation", title: "CWE-20", }, { category: "other", text: "Uncontrolled Recursion", title: "CWE-674", }, ], product_status: { known_affected: [ "CSAFPID-912549", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673391", "CSAFPID-1673394", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1751225", "CSAFPID-1751233", "CSAFPID-1673530", "CSAFPID-1751234", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, references: [ { category: "self", summary: "CVE-2024-7254", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7254.json", }, ], scores: [ { cvss_v3: { baseScore: 8.2, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N", version: "3.1", }, products: [ "CSAFPID-912549", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673391", "CSAFPID-1673394", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1751225", "CSAFPID-1751233", "CSAFPID-1673530", "CSAFPID-1751234", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, ], title: "CVE-2024-7254", }, { cve: "CVE-2024-7592", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, notes: [ { category: "other", text: "Uncontrolled Resource Consumption", title: "CWE-400", }, ], product_status: { known_affected: [ "CSAFPID-1673530", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, references: [ { category: "self", summary: "CVE-2024-7592", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7592.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-1673530", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, ], title: "CVE-2024-7592", }, { cve: "CVE-2024-7885", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, notes: [ { category: "other", text: "Exposure of Sensitive Information to an Unauthorized Actor", title: "CWE-200", }, { category: "other", text: "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", title: "CWE-362", }, ], product_status: { known_affected: [ "CSAFPID-1673526", "CSAFPID-1673399", "CSAFPID-1751080", "CSAFPID-1751090", "CSAFPID-1751079", "CSAFPID-1751225", "CSAFPID-1672767", "CSAFPID-1751241", "CSAFPID-1751081", "CSAFPID-1751084", "CSAFPID-1673393", "CSAFPID-1751085", "CSAFPID-1751231", ], }, references: [ { category: "self", summary: "CVE-2024-7885", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7885.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-1673526", "CSAFPID-1673399", "CSAFPID-1751080", "CSAFPID-1751090", "CSAFPID-1751079", "CSAFPID-1751225", "CSAFPID-1672767", "CSAFPID-1751241", "CSAFPID-1751081", "CSAFPID-1751084", "CSAFPID-1673393", "CSAFPID-1751085", "CSAFPID-1751231", ], }, ], title: "CVE-2024-7885", }, { cve: "CVE-2024-8006", cwe: { id: "CWE-476", name: "NULL Pointer Dereference", }, notes: [ { category: "other", text: "NULL Pointer Dereference", title: "CWE-476", }, ], product_status: { known_affected: [ "CSAFPID-220132", "CSAFPID-1751084", "CSAFPID-912079", ], }, references: [ { category: "self", summary: "CVE-2024-8006", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-8006.json", }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-220132", "CSAFPID-1751084", "CSAFPID-912079", ], }, ], title: "CVE-2024-8006", }, { cve: "CVE-2024-9143", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, notes: [ { category: "other", text: "Out-of-bounds Write", title: "CWE-787", }, ], product_status: { known_affected: [ "CSAFPID-1751253", ], }, references: [ { category: "self", summary: "CVE-2024-9143", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-9143.json", }, ], title: "CVE-2024-9143", }, { cve: "CVE-2024-22195", cwe: { id: "CWE-79", name: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", }, notes: [ { category: "other", text: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", title: "CWE-79", }, ], product_status: { known_affected: [ "CSAFPID-764237", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-611387", "CSAFPID-816773", "CSAFPID-912077", "CSAFPID-816348", "CSAFPID-764240", "CSAFPID-614517", "CSAFPID-224795", "CSAFPID-764826", "CSAFPID-90016", "CSAFPID-912078", "CSAFPID-611413", "CSAFPID-764242", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-93781", "CSAFPID-220132", "CSAFPID-342804", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-219776", "CSAFPID-765242", "CSAFPID-764739", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219826", "CSAFPID-912073", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912085", "CSAFPID-912101", "CSAFPID-912102", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-1751225", "CSAFPID-1751079", "CSAFPID-1751081", "CSAFPID-1673393", "CSAFPID-1751085", ], }, references: [ { category: "self", summary: "CVE-2024-22195", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22195.json", }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "CSAFPID-764237", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-611387", "CSAFPID-816773", "CSAFPID-912077", "CSAFPID-816348", "CSAFPID-764240", "CSAFPID-614517", "CSAFPID-224795", "CSAFPID-764826", "CSAFPID-90016", "CSAFPID-912078", "CSAFPID-611413", "CSAFPID-764242", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-93781", "CSAFPID-220132", "CSAFPID-342804", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-219776", "CSAFPID-765242", "CSAFPID-764739", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219826", "CSAFPID-912073", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912085", "CSAFPID-912101", "CSAFPID-912102", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-1751225", "CSAFPID-1751079", "CSAFPID-1751081", "CSAFPID-1673393", "CSAFPID-1751085", ], }, ], title: "CVE-2024-22195", }, { cve: "CVE-2024-24786", cwe: { id: "CWE-835", name: "Loop with Unreachable Exit Condition ('Infinite Loop')", }, notes: [ { category: "other", text: "Loop with Unreachable Exit Condition ('Infinite Loop')", title: "CWE-835", }, ], product_status: { known_affected: [ "CSAFPID-1673530", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, references: [ { category: "self", summary: "CVE-2024-24786", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24786.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-1673530", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, ], title: "CVE-2024-24786", }, { cve: "CVE-2024-24791", cwe: { id: "CWE-404", name: "Improper Resource Shutdown or Release", }, notes: [ { category: "other", text: "Improper Resource Shutdown or Release", title: "CWE-404", }, { category: "other", text: "Improper Input Validation", title: "CWE-20", }, ], product_status: { known_affected: [ "CSAFPID-1751208", "CSAFPID-1751209", ], }, references: [ { category: "self", summary: "CVE-2024-24791", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24791.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-1751208", "CSAFPID-1751209", ], }, ], title: "CVE-2024-24791", }, { cve: "CVE-2024-25638", cwe: { id: "CWE-345", name: "Insufficient Verification of Data Authenticity", }, notes: [ { category: "other", text: "Insufficient Verification of Data Authenticity", title: "CWE-345", }, { category: "other", text: "Acceptance of Extraneous Untrusted Data With Trusted Data", title: "CWE-349", }, ], product_status: { known_affected: [ "CSAFPID-912549", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1751225", "CSAFPID-1751079", "CSAFPID-1751229", "CSAFPID-1751230", "CSAFPID-1751081", "CSAFPID-1751084", "CSAFPID-1673393", "CSAFPID-1751085", "CSAFPID-1751231", ], }, references: [ { category: "self", summary: "CVE-2024-25638", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25638.json", }, ], scores: [ { cvss_v3: { baseScore: 8.9, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L", version: "3.1", }, products: [ "CSAFPID-912549", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1751225", "CSAFPID-1751079", "CSAFPID-1751229", "CSAFPID-1751230", "CSAFPID-1751081", "CSAFPID-1751084", "CSAFPID-1673393", "CSAFPID-1751085", "CSAFPID-1751231", ], }, ], title: "CVE-2024-25638", }, { cve: "CVE-2024-25710", cwe: { id: "CWE-835", name: "Loop with Unreachable Exit Condition ('Infinite Loop')", }, notes: [ { category: "other", text: "Loop with Unreachable Exit Condition ('Infinite Loop')", title: "CWE-835", }, ], product_status: { known_affected: [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1673389", "CSAFPID-1673390", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-611387", "CSAFPID-816773", "CSAFPID-912101", "CSAFPID-912077", "CSAFPID-816348", "CSAFPID-764240", "CSAFPID-614517", "CSAFPID-224795", "CSAFPID-912102", "CSAFPID-764826", "CSAFPID-90016", "CSAFPID-912078", "CSAFPID-611413", "CSAFPID-764242", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-93781", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-342804", "CSAFPID-912080", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-219776", "CSAFPID-765242", "CSAFPID-764739", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219826", "CSAFPID-912073", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-1727475", "CSAFPID-1751218", ], }, references: [ { category: "self", summary: "CVE-2024-25710", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25710.json", }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1673389", "CSAFPID-1673390", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-912068", "CSAFPID-912076", "CSAFPID-611387", "CSAFPID-816773", "CSAFPID-912101", "CSAFPID-912077", "CSAFPID-816348", "CSAFPID-764240", "CSAFPID-614517", "CSAFPID-224795", "CSAFPID-912102", "CSAFPID-764826", "CSAFPID-90016", "CSAFPID-912078", "CSAFPID-611413", "CSAFPID-764242", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-93781", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-342804", "CSAFPID-912080", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-219776", "CSAFPID-765242", "CSAFPID-764739", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219826", "CSAFPID-912073", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-1727475", "CSAFPID-1751218", ], }, ], title: "CVE-2024-25710", }, { cve: "CVE-2024-26308", cwe: { id: "CWE-770", name: "Allocation of Resources Without Limits or Throttling", }, notes: [ { category: "other", text: "Allocation of Resources Without Limits or Throttling", title: "CWE-770", }, ], product_status: { known_affected: [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1673389", "CSAFPID-1673390", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1670429", "CSAFPID-1670430", "CSAFPID-1670431", "CSAFPID-1670432", "CSAFPID-1670433", "CSAFPID-1670434", "CSAFPID-1670435", "CSAFPID-1670436", "CSAFPID-1670437", "CSAFPID-1670438", "CSAFPID-1670439", "CSAFPID-1670440", "CSAFPID-1670441", "CSAFPID-1670442", "CSAFPID-90016", "CSAFPID-93781", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219776", "CSAFPID-219826", "CSAFPID-220132", "CSAFPID-224795", "CSAFPID-342804", "CSAFPID-611387", "CSAFPID-611413", "CSAFPID-614517", "CSAFPID-764237", "CSAFPID-764240", "CSAFPID-764242", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764739", "CSAFPID-764826", "CSAFPID-765242", "CSAFPID-816348", "CSAFPID-816773", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-912068", "CSAFPID-912073", "CSAFPID-912076", "CSAFPID-912077", "CSAFPID-912078", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912085", "CSAFPID-912101", "CSAFPID-912102", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-1727475", "CSAFPID-1751218", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, references: [ { category: "self", summary: "CVE-2024-26308", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26308.json", }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1673389", "CSAFPID-1673390", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1670429", "CSAFPID-1670430", "CSAFPID-1670431", "CSAFPID-1670432", "CSAFPID-1670433", "CSAFPID-1670434", "CSAFPID-1670435", "CSAFPID-1670436", "CSAFPID-1670437", "CSAFPID-1670438", "CSAFPID-1670439", "CSAFPID-1670440", "CSAFPID-1670441", "CSAFPID-1670442", "CSAFPID-90016", "CSAFPID-93781", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-219776", "CSAFPID-219826", "CSAFPID-220132", "CSAFPID-224795", "CSAFPID-342804", "CSAFPID-611387", "CSAFPID-611413", "CSAFPID-614517", "CSAFPID-764237", "CSAFPID-764240", "CSAFPID-764242", "CSAFPID-764247", "CSAFPID-764735", "CSAFPID-764739", "CSAFPID-764826", "CSAFPID-765242", "CSAFPID-816348", "CSAFPID-816773", "CSAFPID-816781", "CSAFPID-816782", "CSAFPID-912068", "CSAFPID-912073", "CSAFPID-912076", "CSAFPID-912077", "CSAFPID-912078", "CSAFPID-912079", "CSAFPID-912080", "CSAFPID-912085", "CSAFPID-912101", "CSAFPID-912102", "CSAFPID-912539", "CSAFPID-912540", "CSAFPID-912541", "CSAFPID-912542", "CSAFPID-912543", "CSAFPID-912544", "CSAFPID-912545", "CSAFPID-912546", "CSAFPID-912547", "CSAFPID-912548", "CSAFPID-912549", "CSAFPID-912550", "CSAFPID-912551", "CSAFPID-912552", "CSAFPID-912553", "CSAFPID-912554", "CSAFPID-912556", "CSAFPID-912557", "CSAFPID-912558", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-1503582", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-1727475", "CSAFPID-1751218", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, ], title: "CVE-2024-26308", }, { cve: "CVE-2024-27309", cwe: { id: "CWE-284", name: "Improper Access Control", }, notes: [ { category: "other", text: "Improper Access Control", title: "CWE-284", }, { category: "other", text: "Incorrect Authorization", title: "CWE-863", }, ], product_status: { known_affected: [ "CSAFPID-1751233", "CSAFPID-1751234", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, references: [ { category: "self", summary: "CVE-2024-27309", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27309.json", }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "CSAFPID-1751233", "CSAFPID-1751234", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, ], title: "CVE-2024-27309", }, { cve: "CVE-2024-28219", cwe: { id: "CWE-120", name: "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')", }, notes: [ { category: "other", text: "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')", title: "CWE-120", }, { category: "other", text: "Use of Potentially Dangerous Function", title: "CWE-676", }, { category: "other", text: "Integer Overflow to Buffer Overflow", title: "CWE-680", }, ], product_status: { known_affected: [ "CSAFPID-1751079", "CSAFPID-1751225", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1751085", "CSAFPID-912547", ], }, references: [ { category: "self", summary: "CVE-2024-28219", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28219.json", }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", version: "3.1", }, products: [ "CSAFPID-1751079", "CSAFPID-1751225", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1751085", "CSAFPID-912547", ], }, ], title: "CVE-2024-28219", }, { cve: "CVE-2024-28834", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, notes: [ { category: "other", text: "Exposure of Sensitive Information to an Unauthorized Actor", title: "CWE-200", }, { category: "other", text: "Use of a Broken or Risky Cryptographic Algorithm", title: "CWE-327", }, ], product_status: { known_affected: [ "CSAFPID-1673481", "CSAFPID-1751217", "CSAFPID-1503590", ], }, references: [ { category: "self", summary: "CVE-2024-28834", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28834.json", }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "CSAFPID-1673481", "CSAFPID-1751217", "CSAFPID-1503590", ], }, ], title: "CVE-2024-28834", }, { cve: "CVE-2024-28835", cwe: { id: "CWE-248", name: "Uncaught Exception", }, notes: [ { category: "other", text: "Uncaught Exception", title: "CWE-248", }, ], product_status: { known_affected: [ "CSAFPID-1673481", "CSAFPID-1751217", "CSAFPID-1503590", ], }, references: [ { category: "self", summary: "CVE-2024-28835", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28835.json", }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "CSAFPID-1673481", "CSAFPID-1751217", "CSAFPID-1503590", ], }, ], title: "CVE-2024-28835", }, { cve: "CVE-2024-28849", cwe: { id: "CWE-200", name: "Exposure of Sensitive Information to an Unauthorized Actor", }, notes: [ { category: "other", text: "Exposure of Sensitive Information to an Unauthorized Actor", title: "CWE-200", }, ], product_status: { known_affected: [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1673414", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1727475", "CSAFPID-1751235", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, references: [ { category: "self", summary: "CVE-2024-28849", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28849.json", }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1673414", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1727475", "CSAFPID-1751235", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, ], title: "CVE-2024-28849", }, { cve: "CVE-2024-29025", cwe: { id: "CWE-770", name: "Allocation of Resources Without Limits or Throttling", }, notes: [ { category: "other", text: "Allocation of Resources Without Limits or Throttling", title: "CWE-770", }, ], product_status: { known_affected: [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650752", "CSAFPID-1650751", "CSAFPID-1673494", "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1727475", "CSAFPID-1751233", "CSAFPID-1751218", "CSAFPID-1751234", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, references: [ { category: "self", summary: "CVE-2024-29025", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29025.json", }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-1650752", "CSAFPID-1650751", "CSAFPID-1673494", "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1674636", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1727475", "CSAFPID-1751233", "CSAFPID-1751218", "CSAFPID-1751234", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, ], title: "CVE-2024-29025", }, { cve: "CVE-2024-29131", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, notes: [ { category: "other", text: "Out-of-bounds Write", title: "CWE-787", }, ], product_status: { known_affected: [ "CSAFPID-1650820", "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-1673496", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1673530", ], }, references: [ { category: "self", summary: "CVE-2024-29131", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29131.json", }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-1650820", "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-1673496", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1673530", ], }, ], title: "CVE-2024-29131", }, { cve: "CVE-2024-29133", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, notes: [ { category: "other", text: "Out-of-bounds Write", title: "CWE-787", }, ], product_status: { known_affected: [ "CSAFPID-1650820", "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-1673496", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1673530", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, references: [ { category: "self", summary: "CVE-2024-29133", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29133.json", }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "CSAFPID-1650820", "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-1673496", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1673530", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, ], title: "CVE-2024-29133", }, { cve: "CVE-2024-33599", cwe: { id: "CWE-119", name: "Improper Restriction of Operations within the Bounds of a Memory Buffer", }, notes: [ { category: "other", text: "Improper Restriction of Operations within the Bounds of a Memory Buffer", title: "CWE-119", }, { category: "other", text: "Stack-based Buffer Overflow", title: "CWE-121", }, ], product_status: { known_affected: [ "CSAFPID-912549", "CSAFPID-1673396", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1672762", "CSAFPID-1673395", "CSAFPID-1672764", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673494", "CSAFPID-1751237", ], }, references: [ { category: "self", summary: "CVE-2024-33599", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33599.json", }, ], scores: [ { cvss_v3: { baseScore: 8.6, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", version: "3.1", }, products: [ "CSAFPID-912549", "CSAFPID-1673396", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1672762", "CSAFPID-1673395", "CSAFPID-1672764", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673494", "CSAFPID-1751237", ], }, ], title: "CVE-2024-33599", }, { cve: "CVE-2024-33600", cwe: { id: "CWE-476", name: "NULL Pointer Dereference", }, notes: [ { category: "other", text: "NULL Pointer Dereference", title: "CWE-476", }, ], product_status: { known_affected: [ "CSAFPID-912549", "CSAFPID-1673396", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1672762", "CSAFPID-1673395", "CSAFPID-1672764", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673494", "CSAFPID-1751237", ], }, references: [ { category: "self", summary: "CVE-2024-33600", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33600.json", }, ], scores: [ { cvss_v3: { baseScore: 8.6, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", version: "3.1", }, products: [ "CSAFPID-912549", "CSAFPID-1673396", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1672762", "CSAFPID-1673395", "CSAFPID-1672764", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673494", "CSAFPID-1751237", ], }, ], title: "CVE-2024-33600", }, { cve: "CVE-2024-33601", cwe: { id: "CWE-703", name: "Improper Check or Handling of Exceptional Conditions", }, notes: [ { category: "other", text: "Improper Check or Handling of Exceptional Conditions", title: "CWE-703", }, { category: "other", text: "Reachable Assertion", title: "CWE-617", }, ], product_status: { known_affected: [ "CSAFPID-912549", "CSAFPID-1673396", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1672762", "CSAFPID-1673395", "CSAFPID-1672764", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673494", "CSAFPID-1751237", ], }, references: [ { category: "self", summary: "CVE-2024-33601", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33601.json", }, ], scores: [ { cvss_v3: { baseScore: 8.6, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", version: "3.1", }, products: [ "CSAFPID-912549", "CSAFPID-1673396", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1672762", "CSAFPID-1673395", "CSAFPID-1672764", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673494", "CSAFPID-1751237", ], }, ], title: "CVE-2024-33601", }, { cve: "CVE-2024-33602", cwe: { id: "CWE-466", name: "Return of Pointer Value Outside of Expected Range", }, notes: [ { category: "other", text: "Return of Pointer Value Outside of Expected Range", title: "CWE-466", }, { category: "other", text: "Improper Check or Handling of Exceptional Conditions", title: "CWE-703", }, ], product_status: { known_affected: [ "CSAFPID-912549", "CSAFPID-1673396", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1672762", "CSAFPID-1673395", "CSAFPID-1672764", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673494", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1751237", ], }, references: [ { category: "self", summary: "CVE-2024-33602", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33602.json", }, ], scores: [ { cvss_v3: { baseScore: 8.6, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", version: "3.1", }, products: [ "CSAFPID-912549", "CSAFPID-1673396", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-1672762", "CSAFPID-1673395", "CSAFPID-1672764", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673494", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1751237", ], }, ], title: "CVE-2024-33602", }, { cve: "CVE-2024-34064", cwe: { id: "CWE-79", name: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", }, notes: [ { category: "other", text: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", title: "CWE-79", }, ], product_status: { known_affected: [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1727475", "CSAFPID-1751238", "CSAFPID-1751225", "CSAFPID-1751079", "CSAFPID-1751081", "CSAFPID-1673393", "CSAFPID-1751239", "CSAFPID-1751082", "CSAFPID-1751240", "CSAFPID-1672767", "CSAFPID-1751241", "CSAFPID-1673481", "CSAFPID-1751085", ], }, references: [ { category: "self", summary: "CVE-2024-34064", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34064.json", }, ], scores: [ { cvss_v3: { baseScore: 5.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1635310", "CSAFPID-1635311", "CSAFPID-1635312", "CSAFPID-1635313", "CSAFPID-1635314", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635317", "CSAFPID-1635318", "CSAFPID-1635319", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1635322", "CSAFPID-1635323", "CSAFPID-1635324", "CSAFPID-1635325", "CSAFPID-1635326", "CSAFPID-1635327", "CSAFPID-1635328", "CSAFPID-1635329", "CSAFPID-220055", "CSAFPID-1503577", "CSAFPID-764237", "CSAFPID-912085", "CSAFPID-1503578", "CSAFPID-1503579", "CSAFPID-1503580", "CSAFPID-912101", "CSAFPID-1503581", "CSAFPID-1503322", "CSAFPID-912069", "CSAFPID-764240", "CSAFPID-912547", "CSAFPID-1503582", "CSAFPID-912549", "CSAFPID-1503583", "CSAFPID-1503584", "CSAFPID-1503585", "CSAFPID-1503586", "CSAFPID-1503587", "CSAFPID-1503588", "CSAFPID-1503316", "CSAFPID-1503317", "CSAFPID-764242", "CSAFPID-1503589", "CSAFPID-1503590", "CSAFPID-220132", "CSAFPID-912079", "CSAFPID-1503591", "CSAFPID-816789", "CSAFPID-816790", "CSAFPID-1503592", "CSAFPID-1503593", "CSAFPID-1503594", "CSAFPID-1503595", "CSAFPID-342804", "CSAFPID-1503596", "CSAFPID-1503597", "CSAFPID-1503598", "CSAFPID-816792", "CSAFPID-764247", "CSAFPID-912556", "CSAFPID-764735", "CSAFPID-816793", "CSAFPID-1503599", "CSAFPID-1503600", "CSAFPID-342793", "CSAFPID-816350", "CSAFPID-1261", "CSAFPID-342803", "CSAFPID-816354", "CSAFPID-204563", "CSAFPID-764738", "CSAFPID-816355", "CSAFPID-1503601", "CSAFPID-1503602", "CSAFPID-240600", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1727475", "CSAFPID-1751238", "CSAFPID-1751225", "CSAFPID-1751079", "CSAFPID-1751081", "CSAFPID-1673393", "CSAFPID-1751239", "CSAFPID-1751082", "CSAFPID-1751240", "CSAFPID-1672767", "CSAFPID-1751241", "CSAFPID-1673481", "CSAFPID-1751085", ], }, ], title: "CVE-2024-34064", }, { cve: "CVE-2024-34750", cwe: { id: "CWE-755", name: "Improper Handling of Exceptional Conditions", }, notes: [ { category: "other", text: "Improper Handling of Exceptional Conditions", title: "CWE-755", }, { category: "other", text: "Uncontrolled Resource Consumption", title: "CWE-400", }, ], product_status: { known_affected: [ "CSAFPID-1673481", "CSAFPID-1503596", "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1751242", "CSAFPID-1751243", "CSAFPID-1751079", "CSAFPID-1751225", "CSAFPID-1751085", ], }, references: [ { category: "self", summary: "CVE-2024-34750", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34750.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-1673481", "CSAFPID-1503596", "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1751242", "CSAFPID-1751243", "CSAFPID-1751079", "CSAFPID-1751225", "CSAFPID-1751085", ], }, ], title: "CVE-2024-34750", }, { cve: "CVE-2024-35195", cwe: { id: "CWE-670", name: "Always-Incorrect Control Flow Implementation", }, notes: [ { category: "other", text: "Always-Incorrect Control Flow Implementation", title: "CWE-670", }, ], product_status: { known_affected: [ "CSAFPID-1751246", "CSAFPID-1751247", "CSAFPID-1751248", "CSAFPID-1673530", "CSAFPID-1673393", "CSAFPID-1751239", "CSAFPID-220132", "CSAFPID-1751082", "CSAFPID-1672767", "CSAFPID-1751241", "CSAFPID-912079", "CSAFPID-916906", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, references: [ { category: "self", summary: "CVE-2024-35195", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35195.json", }, ], scores: [ { cvss_v3: { baseScore: 5.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "CSAFPID-1751246", "CSAFPID-1751247", "CSAFPID-1751248", "CSAFPID-1673530", "CSAFPID-1673393", "CSAFPID-1751239", "CSAFPID-220132", "CSAFPID-1751082", "CSAFPID-1672767", "CSAFPID-1751241", "CSAFPID-912079", "CSAFPID-916906", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, ], title: "CVE-2024-35195", }, { cve: "CVE-2024-37370", cwe: { id: "CWE-130", name: "Improper Handling of Length Parameter Inconsistency", }, notes: [ { category: "other", text: "Improper Handling of Length Parameter Inconsistency", title: "CWE-130", }, ], product_status: { known_affected: [ "CSAFPID-912549", "CSAFPID-1673413", "CSAFPID-1673414", "CSAFPID-1673396", "CSAFPID-1503590", "CSAFPID-1673393", "CSAFPID-1673395", "CSAFPID-1673399", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673392", "CSAFPID-1503589", "CSAFPID-1673415", "CSAFPID-1673389", "CSAFPID-1673390", "CSAFPID-1751237", "CSAFPID-1751254", "CSAFPID-1751217", "CSAFPID-1673481", "CSAFPID-1751255", ], }, references: [ { category: "self", summary: "CVE-2024-37370", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37370.json", }, ], scores: [ { cvss_v3: { baseScore: 9.1, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-912549", "CSAFPID-1673413", "CSAFPID-1673414", "CSAFPID-1673396", "CSAFPID-1503590", "CSAFPID-1673393", "CSAFPID-1673395", "CSAFPID-1673399", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673392", "CSAFPID-1503589", "CSAFPID-1673415", "CSAFPID-1673389", "CSAFPID-1673390", "CSAFPID-1751237", "CSAFPID-1751254", "CSAFPID-1751217", "CSAFPID-1673481", "CSAFPID-1751255", ], }, ], title: "CVE-2024-37370", }, { cve: "CVE-2024-37371", cwe: { id: "CWE-130", name: "Improper Handling of Length Parameter Inconsistency", }, notes: [ { category: "other", text: "Improper Handling of Length Parameter Inconsistency", title: "CWE-130", }, ], product_status: { known_affected: [ "CSAFPID-912549", "CSAFPID-1673413", "CSAFPID-1673414", "CSAFPID-1673396", "CSAFPID-1503590", "CSAFPID-1673393", "CSAFPID-1673395", "CSAFPID-1673399", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673392", "CSAFPID-1503589", "CSAFPID-1673415", "CSAFPID-1673389", "CSAFPID-1673390", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1751237", "CSAFPID-1751254", "CSAFPID-1751217", "CSAFPID-1673481", "CSAFPID-1751255", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, references: [ { category: "self", summary: "CVE-2024-37371", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37371.json", }, ], scores: [ { cvss_v3: { baseScore: 9.1, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-912549", "CSAFPID-1673413", "CSAFPID-1673414", "CSAFPID-1673396", "CSAFPID-1503590", "CSAFPID-1673393", "CSAFPID-1673395", "CSAFPID-1673399", "CSAFPID-1672767", "CSAFPID-1503585", "CSAFPID-1673392", "CSAFPID-1503589", "CSAFPID-1673415", "CSAFPID-1673389", "CSAFPID-1673390", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1751237", "CSAFPID-1751254", "CSAFPID-1751217", "CSAFPID-1673481", "CSAFPID-1751255", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, ], title: "CVE-2024-37371", }, { cve: "CVE-2024-37891", cwe: { id: "CWE-669", name: "Incorrect Resource Transfer Between Spheres", }, notes: [ { category: "other", text: "Incorrect Resource Transfer Between Spheres", title: "CWE-669", }, ], product_status: { known_affected: [ "CSAFPID-1673395", "CSAFPID-1673396", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1751225", "CSAFPID-1751254", "CSAFPID-1673530", "CSAFPID-1751217", "CSAFPID-1751255", "CSAFPID-816790", "CSAFPID-1751258", "CSAFPID-1673481", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, references: [ { category: "self", summary: "CVE-2024-37891", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37891.json", }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "CSAFPID-1673395", "CSAFPID-1673396", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1751225", "CSAFPID-1751254", "CSAFPID-1673530", "CSAFPID-1751217", "CSAFPID-1751255", "CSAFPID-816790", "CSAFPID-1751258", "CSAFPID-1673481", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, ], title: "CVE-2024-37891", }, { cve: "CVE-2024-38475", cwe: { id: "CWE-284", name: "Improper Access Control", }, notes: [ { category: "other", text: "Improper Access Control", title: "CWE-284", }, { category: "other", text: "Improper Encoding or Escaping of Output", title: "CWE-116", }, { category: "other", text: "Path Traversal: '.../...//'", title: "CWE-35", }, { category: "other", text: "Stack-based Buffer Overflow", title: "CWE-121", }, { category: "other", text: "Heap-based Buffer Overflow", title: "CWE-122", }, { category: "other", text: "Use of Hard-coded Credentials", title: "CWE-798", }, { category: "other", text: "Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)", title: "CWE-338", }, ], references: [ { category: "self", summary: "CVE-2024-38475", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38475.json", }, ], title: "CVE-2024-38475", }, { cve: "CVE-2024-38807", cwe: { id: "CWE-347", name: "Improper Verification of Cryptographic Signature", }, notes: [ { category: "other", text: "Improper Verification of Cryptographic Signature", title: "CWE-347", }, ], product_status: { known_affected: [ "CSAFPID-1751090", "CSAFPID-1751233", "CSAFPID-1751234", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, references: [ { category: "self", summary: "CVE-2024-38807", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38807.json", }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "CSAFPID-1751090", "CSAFPID-1751233", "CSAFPID-1751234", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, ], title: "CVE-2024-38807", }, { cve: "CVE-2024-38809", cwe: { id: "CWE-1333", name: "Inefficient Regular Expression Complexity", }, notes: [ { category: "other", text: "Inefficient Regular Expression Complexity", title: "CWE-1333", }, { category: "other", text: "Improper Resource Shutdown or Release", title: "CWE-404", }, { category: "other", text: "Uncontrolled Resource Consumption", title: "CWE-400", }, ], product_status: { known_affected: [ "CSAFPID-1673393", ], }, references: [ { category: "self", summary: "CVE-2024-38809", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38809.json", }, ], scores: [ { cvss_v3: { baseScore: 8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "CSAFPID-1673393", ], }, ], title: "CVE-2024-38809", }, { cve: "CVE-2024-38816", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, notes: [ { category: "other", text: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", title: "CWE-22", }, { category: "other", text: "Relative Path Traversal", title: "CWE-23", }, ], product_status: { known_affected: [ "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1751081", "CSAFPID-1673393", "CSAFPID-1751079", "CSAFPID-1751080", "CSAFPID-1751084", "CSAFPID-1751085", "CSAFPID-1751082", "CSAFPID-1751225", ], }, references: [ { category: "self", summary: "CVE-2024-38816", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38816.json", }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "CSAFPID-1673420", "CSAFPID-1673421", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1751081", "CSAFPID-1673393", "CSAFPID-1751079", "CSAFPID-1751080", "CSAFPID-1751084", "CSAFPID-1751085", "CSAFPID-1751082", "CSAFPID-1751225", ], }, ], title: "CVE-2024-38816", }, { cve: "CVE-2024-38819", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, notes: [ { category: "other", text: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", title: "CWE-22", }, ], product_status: { known_affected: [ "CSAFPID-1673393", "CSAFPID-1751079", "CSAFPID-1751080", "CSAFPID-1751081", "CSAFPID-1751082", "CSAFPID-1751084", "CSAFPID-1751085", "CSAFPID-1751225", "CSAFPID-1672767", "CSAFPID-1751241", ], }, references: [ { category: "self", summary: "CVE-2024-38819", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38819.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "CSAFPID-1673393", "CSAFPID-1751079", "CSAFPID-1751080", "CSAFPID-1751081", "CSAFPID-1751082", "CSAFPID-1751084", "CSAFPID-1751085", "CSAFPID-1751225", "CSAFPID-1672767", "CSAFPID-1751241", ], }, ], title: "CVE-2024-38819", }, { cve: "CVE-2024-38820", cwe: { id: "CWE-284", name: "Improper Access Control", }, notes: [ { category: "other", text: "Improper Access Control", title: "CWE-284", }, { category: "other", text: "Improper Handling of Case Sensitivity", title: "CWE-178", }, ], product_status: { known_affected: [ "CSAFPID-1751079", "CSAFPID-1751225", "CSAFPID-1751081", "CSAFPID-1751084", "CSAFPID-1673393", "CSAFPID-1751080", "CSAFPID-1751082", "CSAFPID-1751085", "CSAFPID-1672767", "CSAFPID-1751241", ], }, references: [ { category: "self", summary: "CVE-2024-38820", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38820.json", }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-1751079", "CSAFPID-1751225", "CSAFPID-1751081", "CSAFPID-1751084", "CSAFPID-1673393", "CSAFPID-1751080", "CSAFPID-1751082", "CSAFPID-1751085", "CSAFPID-1672767", "CSAFPID-1751241", ], }, ], title: "CVE-2024-38820", }, { cve: "CVE-2024-38827", cwe: { id: "CWE-639", name: "Authorization Bypass Through User-Controlled Key", }, notes: [ { category: "other", text: "Authorization Bypass Through User-Controlled Key", title: "CWE-639", }, ], product_status: { known_affected: [ "CSAFPID-1751225", "CSAFPID-1751079", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1673393", "CSAFPID-1751085", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, references: [ { category: "self", summary: "CVE-2024-38827", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38827.json", }, ], scores: [ { cvss_v3: { baseScore: 4.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "CSAFPID-1751225", "CSAFPID-1751079", "CSAFPID-204510", "CSAFPID-204569", "CSAFPID-1673393", "CSAFPID-1751085", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, ], title: "CVE-2024-38827", }, { cve: "CVE-2024-38998", cwe: { id: "CWE-1321", name: "Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')", }, notes: [ { category: "other", text: "Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')", title: "CWE-1321", }, ], product_status: { known_affected: [ "CSAFPID-1751225", "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-912073", "CSAFPID-1751254", "CSAFPID-1751079", "CSAFPID-1751242", "CSAFPID-1751234", "CSAFPID-1673496", "CSAFPID-1751233", "CSAFPID-1751255", "CSAFPID-1673481", "CSAFPID-1751085", "CSAFPID-220132", "CSAFPID-912079", ], }, references: [ { category: "self", summary: "CVE-2024-38998", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38998.json", }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-1751225", "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-912073", "CSAFPID-1751254", "CSAFPID-1751079", "CSAFPID-1751242", "CSAFPID-1751234", "CSAFPID-1673496", "CSAFPID-1751233", "CSAFPID-1751255", "CSAFPID-1673481", "CSAFPID-1751085", "CSAFPID-220132", "CSAFPID-912079", ], }, ], title: "CVE-2024-38998", }, { cve: "CVE-2024-38999", cwe: { id: "CWE-1321", name: "Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')", }, notes: [ { category: "other", text: "Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')", title: "CWE-1321", }, ], product_status: { known_affected: [ "CSAFPID-1751225", "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-912073", "CSAFPID-1751254", "CSAFPID-1751079", "CSAFPID-1751242", "CSAFPID-1751234", "CSAFPID-1673496", "CSAFPID-1751233", "CSAFPID-1751255", "CSAFPID-1673481", "CSAFPID-1751085", "CSAFPID-220132", "CSAFPID-912079", ], }, references: [ { category: "self", summary: "CVE-2024-38999", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38999.json", }, ], scores: [ { cvss_v3: { baseScore: 10, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-1751225", "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-912073", "CSAFPID-1751254", "CSAFPID-1751079", "CSAFPID-1751242", "CSAFPID-1751234", "CSAFPID-1673496", "CSAFPID-1751233", "CSAFPID-1751255", "CSAFPID-1673481", "CSAFPID-1751085", "CSAFPID-220132", "CSAFPID-912079", ], }, ], title: "CVE-2024-38999", }, { cve: "CVE-2024-41817", cwe: { id: "CWE-427", name: "Uncontrolled Search Path Element", }, notes: [ { category: "other", text: "Uncontrolled Search Path Element", title: "CWE-427", }, ], product_status: { known_affected: [ "CSAFPID-1673382", "CSAFPID-1650731", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628", "CSAFPID-220132", "CSAFPID-912079", ], }, references: [ { category: "self", summary: "CVE-2024-41817", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41817.json", }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-1673382", "CSAFPID-1650731", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628", "CSAFPID-220132", "CSAFPID-912079", ], }, ], title: "CVE-2024-41817", }, { cve: "CVE-2024-45490", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, notes: [ { category: "other", text: "Integer Overflow or Wraparound", title: "CWE-190", }, { category: "other", text: "Incorrect Calculation of Buffer Size", title: "CWE-131", }, { category: "other", text: "Improper Restriction of XML External Entity Reference", title: "CWE-611", }, ], product_status: { known_affected: [ "CSAFPID-1673382", "CSAFPID-1673399", "CSAFPID-1650731", "CSAFPID-1673517", "CSAFPID-1673396", "CSAFPID-1673414", "CSAFPID-1503590", ], }, references: [ { category: "self", summary: "CVE-2024-45490", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45490.json", }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-1673382", "CSAFPID-1673399", "CSAFPID-1650731", "CSAFPID-1673517", "CSAFPID-1673396", "CSAFPID-1673414", "CSAFPID-1503590", ], }, ], title: "CVE-2024-45490", }, { cve: "CVE-2024-45491", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, notes: [ { category: "other", text: "Integer Overflow or Wraparound", title: "CWE-190", }, ], product_status: { known_affected: [ "CSAFPID-1673382", "CSAFPID-1673399", "CSAFPID-1650731", "CSAFPID-1673517", "CSAFPID-1673396", "CSAFPID-1673414", "CSAFPID-1503590", ], }, references: [ { category: "self", summary: "CVE-2024-45491", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45491.json", }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-1673382", "CSAFPID-1673399", "CSAFPID-1650731", "CSAFPID-1673517", "CSAFPID-1673396", "CSAFPID-1673414", "CSAFPID-1503590", ], }, ], title: "CVE-2024-45491", }, { cve: "CVE-2024-45492", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, notes: [ { category: "other", text: "Integer Overflow or Wraparound", title: "CWE-190", }, ], product_status: { known_affected: [ "CSAFPID-1673382", "CSAFPID-1673399", "CSAFPID-1650731", "CSAFPID-1673517", "CSAFPID-1673396", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1673414", "CSAFPID-1503590", ], }, references: [ { category: "self", summary: "CVE-2024-45492", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45492.json", }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-1673382", "CSAFPID-1673399", "CSAFPID-1650731", "CSAFPID-1673517", "CSAFPID-1673396", "CSAFPID-1674617", "CSAFPID-1674618", "CSAFPID-1674619", "CSAFPID-1674620", "CSAFPID-1674621", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1674624", "CSAFPID-1674625", "CSAFPID-1674626", "CSAFPID-1674627", "CSAFPID-1674628", "CSAFPID-1635305", "CSAFPID-1635306", "CSAFPID-1635307", "CSAFPID-1635308", "CSAFPID-1635309", "CSAFPID-1670434", "CSAFPID-1674629", "CSAFPID-1635315", "CSAFPID-1635316", "CSAFPID-1635318", "CSAFPID-1674630", "CSAFPID-1674631", "CSAFPID-1674632", "CSAFPID-1674633", "CSAFPID-1674634", "CSAFPID-1674635", "CSAFPID-1635323", "CSAFPID-1674636", "CSAFPID-1635324", "CSAFPID-1674637", "CSAFPID-1674638", "CSAFPID-1674639", "CSAFPID-1674640", "CSAFPID-1674641", "CSAFPID-1674642", "CSAFPID-1635320", "CSAFPID-1635321", "CSAFPID-1674643", "CSAFPID-1674644", "CSAFPID-1674645", "CSAFPID-1674646", "CSAFPID-1673414", "CSAFPID-1503590", ], }, ], title: "CVE-2024-45492", }, { cve: "CVE-2024-47535", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, notes: [ { category: "other", text: "Uncontrolled Resource Consumption", title: "CWE-400", }, ], product_status: { known_affected: [ "CSAFPID-1751233", "CSAFPID-1751234", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, references: [ { category: "self", summary: "CVE-2024-47535", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47535.json", }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-1751233", "CSAFPID-1751234", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, ], title: "CVE-2024-47535", }, { cve: "CVE-2024-47554", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, notes: [ { category: "other", text: "Uncontrolled Resource Consumption", title: "CWE-400", }, ], product_status: { known_affected: [ "CSAFPID-1751292", "CSAFPID-1751234", "CSAFPID-1751294", "CSAFPID-1751233", "CSAFPID-1751295", "CSAFPID-1751296", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, references: [ { category: "self", summary: "CVE-2024-47554", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47554.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-1751292", "CSAFPID-1751234", "CSAFPID-1751294", "CSAFPID-1751233", "CSAFPID-1751295", "CSAFPID-1751296", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, ], title: "CVE-2024-47554", }, { cve: "CVE-2024-47561", cwe: { id: "CWE-502", name: "Deserialization of Untrusted Data", }, notes: [ { category: "other", text: "Deserialization of Untrusted Data", title: "CWE-502", }, ], product_status: { known_affected: [ "CSAFPID-1751296", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, references: [ { category: "self", summary: "CVE-2024-47561", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47561.json", }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-1751296", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, ], title: "CVE-2024-47561", }, { cve: "CVE-2024-47803", cwe: { id: "CWE-209", name: "Generation of Error Message Containing Sensitive Information", }, notes: [ { category: "other", text: "Generation of Error Message Containing Sensitive Information", title: "CWE-209", }, ], product_status: { known_affected: [ "CSAFPID-1751079", "CSAFPID-1751225", "CSAFPID-1672767", "CSAFPID-1751300", "CSAFPID-1751241", "CSAFPID-1751081", "CSAFPID-1751084", "CSAFPID-1673393", "CSAFPID-1751085", ], }, references: [ { category: "self", summary: "CVE-2024-47803", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47803.json", }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "CSAFPID-1751079", "CSAFPID-1751225", "CSAFPID-1672767", "CSAFPID-1751300", "CSAFPID-1751241", "CSAFPID-1751081", "CSAFPID-1751084", "CSAFPID-1673393", "CSAFPID-1751085", ], }, ], title: "CVE-2024-47803", }, { cve: "CVE-2024-47804", cwe: { id: "CWE-863", name: "Incorrect Authorization", }, notes: [ { category: "other", text: "Incorrect Authorization", title: "CWE-863", }, { category: "other", text: "Insufficient Granularity of Access Control", title: "CWE-1220", }, { category: "other", text: "Access of Resource Using Incompatible Type ('Type Confusion')", title: "CWE-843", }, ], product_status: { known_affected: [ "CSAFPID-1751225", "CSAFPID-1751079", "CSAFPID-1672767", "CSAFPID-1751300", "CSAFPID-1751241", "CSAFPID-1751081", "CSAFPID-1751084", "CSAFPID-1673393", "CSAFPID-1751085", ], }, references: [ { category: "self", summary: "CVE-2024-47804", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47804.json", }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "CSAFPID-1751225", "CSAFPID-1751079", "CSAFPID-1672767", "CSAFPID-1751300", "CSAFPID-1751241", "CSAFPID-1751081", "CSAFPID-1751084", "CSAFPID-1673393", "CSAFPID-1751085", ], }, ], title: "CVE-2024-47804", }, { cve: "CVE-2024-49766", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, notes: [ { category: "other", text: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", title: "CWE-22", }, ], product_status: { known_affected: [ "CSAFPID-1751208", "CSAFPID-1751246", "CSAFPID-1751209", ], }, references: [ { category: "self", summary: "CVE-2024-49766", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49766.json", }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-1751208", "CSAFPID-1751246", "CSAFPID-1751209", ], }, ], title: "CVE-2024-49766", }, { cve: "CVE-2024-49767", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, notes: [ { category: "other", text: "Uncontrolled Resource Consumption", title: "CWE-400", }, { category: "other", text: "Allocation of Resources Without Limits or Throttling", title: "CWE-770", }, ], product_status: { known_affected: [ "CSAFPID-1751208", "CSAFPID-1751080", "CSAFPID-1751079", "CSAFPID-1751225", "CSAFPID-1751082", "CSAFPID-1751300", "CSAFPID-1751246", "CSAFPID-1751209", "CSAFPID-1673393", "CSAFPID-1751085", "CSAFPID-1751231", ], }, references: [ { category: "self", summary: "CVE-2024-49767", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49767.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-1751208", "CSAFPID-1751080", "CSAFPID-1751079", "CSAFPID-1751225", "CSAFPID-1751082", "CSAFPID-1751300", "CSAFPID-1751246", "CSAFPID-1751209", "CSAFPID-1673393", "CSAFPID-1751085", "CSAFPID-1751231", ], }, ], title: "CVE-2024-49767", }, { cve: "CVE-2024-50379", cwe: { id: "CWE-367", name: "Time-of-check Time-of-use (TOCTOU) Race Condition", }, notes: [ { category: "other", text: "Time-of-check Time-of-use (TOCTOU) Race Condition", title: "CWE-367", }, ], product_status: { known_affected: [ "CSAFPID-816790", ], }, references: [ { category: "self", summary: "CVE-2024-50379", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50379.json", }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-816790", ], }, ], title: "CVE-2024-50379", }, { cve: "CVE-2024-50602", cwe: { id: "CWE-404", name: "Improper Resource Shutdown or Release", }, notes: [ { category: "other", text: "Improper Resource Shutdown or Release", title: "CWE-404", }, { category: "other", text: "Improper Check for Unusual or Exceptional Conditions", title: "CWE-754", }, ], product_status: { known_affected: [ "CSAFPID-1751225", "CSAFPID-1751079", "CSAFPID-1751082", "CSAFPID-1751085", ], }, references: [ { category: "self", summary: "CVE-2024-50602", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50602.json", }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-1751225", "CSAFPID-1751079", "CSAFPID-1751082", "CSAFPID-1751085", ], }, ], title: "CVE-2024-50602", }, { cve: "CVE-2024-53677", cwe: { id: "CWE-22", name: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", }, notes: [ { category: "other", text: "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", title: "CWE-22", }, { category: "other", text: "Unrestricted Upload of File with Dangerous Type", title: "CWE-434", }, { category: "other", text: "Files or Directories Accessible to External Parties", title: "CWE-552", }, ], product_status: { known_affected: [ "CSAFPID-816790", ], }, references: [ { category: "self", summary: "CVE-2024-53677", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-53677.json", }, ], scores: [ { cvss_v3: { baseScore: 9, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-816790", ], }, ], title: "CVE-2024-53677", }, { cve: "CVE-2024-54677", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, notes: [ { category: "other", text: "Uncontrolled Resource Consumption", title: "CWE-400", }, ], product_status: { known_affected: [ "CSAFPID-816790", ], }, references: [ { category: "self", summary: "CVE-2024-54677", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-54677.json", }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-816790", ], }, ], title: "CVE-2024-54677", }, { cve: "CVE-2024-56337", cwe: { id: "CWE-367", name: "Time-of-check Time-of-use (TOCTOU) Race Condition", }, notes: [ { category: "other", text: "Time-of-check Time-of-use (TOCTOU) Race Condition", title: "CWE-367", }, ], product_status: { known_affected: [ "CSAFPID-816790", ], }, references: [ { category: "self", summary: "CVE-2024-56337", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-56337.json", }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-816790", ], }, ], title: "CVE-2024-56337", }, { cve: "CVE-2025-21542", product_status: { known_affected: [ "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-1673496", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, references: [ { category: "self", summary: "CVE-2025-21542", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21542.json", }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-1673496", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, ], title: "CVE-2025-21542", }, { cve: "CVE-2025-21544", product_status: { known_affected: [ "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-1673496", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, references: [ { category: "self", summary: "CVE-2025-21544", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21544.json", }, ], scores: [ { cvss_v3: { baseScore: 5.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, products: [ "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-1673496", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, ], title: "CVE-2025-21544", }, { cve: "CVE-2025-21554", product_status: { known_affected: [ "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-1673496", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, references: [ { category: "self", summary: "CVE-2025-21554", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21554.json", }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "CSAFPID-224790", "CSAFPID-221118", "CSAFPID-1673496", "CSAFPID-1751377", "CSAFPID-1751378", "CSAFPID-1751379", "CSAFPID-1751380", "CSAFPID-1751381", "CSAFPID-1751382", "CSAFPID-1751383", "CSAFPID-1674619", "CSAFPID-1674622", "CSAFPID-1674623", "CSAFPID-1751384", "CSAFPID-1751385", "CSAFPID-1751386", ], }, ], title: "CVE-2025-21554", }, ], }
ncsc-2025-0041
Vulnerability from csaf_ncscnl
Notes
{ document: { category: "csaf_security_advisory", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", }, }, lang: "nl", notes: [ { category: "legal_disclaimer", text: "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.", }, { category: "description", text: "F5 heeft kwetsbaarheden verholpen in BIG-IP.", title: "Feiten", }, { category: "description", text: "Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorieën schade:\n\n- Denial-of-Service (DoS)\n- Omzeilen van een beveiligingsmaatregel\n- Uitvoer van willekeurige code (Root/admin)\n- Uitvoer van willekeurige code (Gebruiker)\n- Toegang tot gevoelige gegevens", title: "Interpretaties", }, { category: "description", text: "F5 heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.", title: "Oplossingen", }, { category: "general", text: "medium", title: "Kans", }, { category: "general", text: "high", title: "Schade", }, { category: "general", text: "Missing Release of Resource after Effective Lifetime", title: "CWE-772", }, { category: "general", text: "Time-of-check Time-of-use (TOCTOU) Race Condition", title: "CWE-367", }, { category: "general", text: "Missing Encryption of Sensitive Data", title: "CWE-311", }, { category: "general", text: "Untrusted Search Path", title: "CWE-426", }, { category: "general", text: "Insufficient Verification of Data Authenticity", title: "CWE-345", }, { category: "general", text: "Improper Neutralization of Special Elements used in a Command ('Command Injection')", title: "CWE-77", }, { category: "general", text: "Integer Overflow or Wraparound", title: "CWE-190", }, { category: "general", text: "Protection Mechanism Failure", title: "CWE-693", }, { category: "general", text: "Out-of-bounds Read", title: "CWE-125", }, { category: "general", text: "Missing Release of Memory after Effective Lifetime", title: "CWE-401", }, { category: "general", text: "NULL Pointer Dereference", title: "CWE-476", }, { category: "general", text: "Uncontrolled Resource Consumption", title: "CWE-400", }, { category: "general", text: "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')", title: "CWE-78", }, { category: "general", text: "Out-of-bounds Write", title: "CWE-787", }, { category: "general", text: "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')", title: "CWE-120", }, { category: "general", text: "Improper Input Validation", title: "CWE-20", }, { category: "general", text: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", title: "CWE-79", }, ], publisher: { category: "coordinator", contact_details: "cert@ncsc.nl", name: "Nationaal Cyber Security Centrum", namespace: "https://www.ncsc.nl/", }, references: [ { category: "external", summary: "Reference - cveprojectv5; nvd", url: "https://my.f5.com/manage/s/article/K000138757", }, { category: "external", summary: "Reference - cveprojectv5; nvd", url: "https://my.f5.com/manage/s/article/K000138932", }, { category: "external", summary: "Reference - cveprojectv5; nvd", url: "https://my.f5.com/manage/s/article/K000139656", }, { category: "external", summary: "Reference - cveprojectv5; nvd", url: "https://my.f5.com/manage/s/article/K000139778", }, { category: "external", summary: "Reference - cveprojectv5; nvd", url: "https://my.f5.com/manage/s/article/K000140578", }, { category: "external", summary: "Reference - cveprojectv5; nvd", url: "https://my.f5.com/manage/s/article/K000140920", }, { category: "external", summary: "Reference - cveprojectv5; nvd", url: "https://my.f5.com/manage/s/article/K000140933", }, { category: "external", summary: "Reference - cveprojectv5; nvd", url: "https://my.f5.com/manage/s/article/K000140947", }, { category: "external", summary: "Reference - cveprojectv5; nvd", url: "https://my.f5.com/manage/s/article/K000140950", }, { category: "external", summary: "Reference - cveprojectv5; nvd", url: "https://my.f5.com/manage/s/article/K000141003", }, { category: "external", summary: "Reference - cveprojectv5; nvd", url: "https://my.f5.com/manage/s/article/K000148587", }, ], title: "Kwetsbaarheden verholpen in F5 BIG-IP", tracking: { current_release_date: "2025-02-11T06:51:17.629249Z", id: "NCSC-2025-0041", initial_release_date: "2025-02-07T07:38:11.981975Z", revision_history: [ { date: "2025-02-07T07:38:11.981975Z", number: "0", summary: "Initiele versie", }, { date: "2025-02-11T06:51:17.629249Z", number: "1", summary: "Door een technisch issue is deze advisory eerder verstuurd met een invalide signature, waardoor automatische verwerking mogelijk verstoord is. Deze update verhelpt dat. Er is verder geen inhoudelijke wijziging.", }, ], status: "final", version: "1.0.1", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "big-ip", product: { name: "big-ip", product_id: "CSAFPID-310988", product_identification_helper: { cpe: "cpe:2.3:a:f5:big-ip:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "big-ip_next", product: { name: "big-ip_next", product_id: "CSAFPID-636427", product_identification_helper: { cpe: "cpe:2.3:a:f5:big-ip_next:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "big-ip_next_central_manager", product: { name: "big-ip_next_central_manager", product_id: "CSAFPID-1620063", product_identification_helper: { cpe: "cpe:2.3:a:f5:big-ip_next_central_manager:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "big-ip_next_cnf", product: { name: "big-ip_next_cnf", product_id: "CSAFPID-636429", product_identification_helper: { cpe: "cpe:2.3:a:f5:big-ip_next_cnf:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "big-ip_next_spk", product: { name: "big-ip_next_spk", product_id: "CSAFPID-636428", product_identification_helper: { cpe: "cpe:2.3:a:f5:big-ip_next_spk:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "nginx_open_source", product: { name: "nginx_open_source", product_id: "CSAFPID-842689", product_identification_helper: { cpe: "cpe:2.3:a:f5:nginx_open_source:*:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "nginx_plus", product: { name: "nginx_plus", product_id: "CSAFPID-842688", product_identification_helper: { cpe: "cpe:2.3:a:f5:nginx_plus:*:*:*:*:*:*:*:*", }, }, }, ], category: "vendor", name: "f5", }, ], }, vulnerabilities: [ { cve: "CVE-2014-0064", cwe: { id: "CWE-190", name: "Integer Overflow or Wraparound", }, notes: [ { category: "other", text: "Integer Overflow or Wraparound", title: "CWE-190", }, ], product_status: { known_affected: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, references: [ { category: "self", summary: "CVE-2014-0064", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2014/CVE-2014-0064.json", }, ], title: "CVE-2014-0064", }, { cve: "CVE-2014-0065", product_status: { known_affected: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, references: [ { category: "self", summary: "CVE-2014-0065", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2014/CVE-2014-0065.json", }, ], title: "CVE-2014-0065", }, { cve: "CVE-2014-0066", cwe: { id: "CWE-476", name: "NULL Pointer Dereference", }, notes: [ { category: "other", text: "NULL Pointer Dereference", title: "CWE-476", }, ], product_status: { known_affected: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, references: [ { category: "self", summary: "CVE-2014-0066", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2014/CVE-2014-0066.json", }, ], title: "CVE-2014-0066", }, { cve: "CVE-2014-0067", product_status: { known_affected: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, references: [ { category: "self", summary: "CVE-2014-0067", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2014/CVE-2014-0067.json", }, ], title: "CVE-2014-0067", }, { cve: "CVE-2019-5010", cwe: { id: "CWE-476", name: "NULL Pointer Dereference", }, notes: [ { category: "other", text: "NULL Pointer Dereference", title: "CWE-476", }, ], product_status: { known_affected: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, references: [ { category: "self", summary: "CVE-2019-5010", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2019/CVE-2019-5010.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, ], title: "CVE-2019-5010", }, { cve: "CVE-2019-16056", cwe: { id: "CWE-311", name: "Missing Encryption of Sensitive Data", }, notes: [ { category: "other", text: "Missing Encryption of Sensitive Data", title: "CWE-311", }, { category: "other", text: "Improper Input Validation", title: "CWE-20", }, ], product_status: { known_affected: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, references: [ { category: "self", summary: "CVE-2019-16056", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2019/CVE-2019-16056.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, ], title: "CVE-2019-16056", }, { cve: "CVE-2022-26488", cwe: { id: "CWE-426", name: "Untrusted Search Path", }, notes: [ { category: "other", text: "Untrusted Search Path", title: "CWE-426", }, ], product_status: { known_affected: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, references: [ { category: "self", summary: "CVE-2022-26488", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-26488.json", }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, ], title: "CVE-2022-26488", }, { cve: "CVE-2024-36242", cwe: { id: "CWE-693", name: "Protection Mechanism Failure", }, notes: [ { category: "other", text: "Protection Mechanism Failure", title: "CWE-693", }, { category: "general", text: "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, references: [ { category: "self", summary: "CVE-2024-36242", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36242.json", }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, ], title: "CVE-2024-36242", }, { cve: "CVE-2024-38660", cwe: { id: "CWE-693", name: "Protection Mechanism Failure", }, notes: [ { category: "other", text: "Protection Mechanism Failure", title: "CWE-693", }, { category: "general", text: "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, references: [ { category: "self", summary: "CVE-2024-38660", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38660.json", }, ], scores: [ { cvss_v3: { baseScore: 3.8, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N", version: "3.1", }, products: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, ], title: "CVE-2024-38660", }, { cve: "CVE-2024-56337", cwe: { id: "CWE-367", name: "Time-of-check Time-of-use (TOCTOU) Race Condition", }, notes: [ { category: "other", text: "Time-of-check Time-of-use (TOCTOU) Race Condition", title: "CWE-367", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, references: [ { category: "self", summary: "CVE-2024-56337", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-56337.json", }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, ], title: "CVE-2024-56337", }, { cve: "CVE-2025-20029", cwe: { id: "CWE-78", name: "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')", }, notes: [ { category: "other", text: "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')", title: "CWE-78", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, references: [ { category: "self", summary: "CVE-2025-20029", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-20029.json", }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, ], title: "CVE-2025-20029", }, { cve: "CVE-2025-20045", cwe: { id: "CWE-476", name: "NULL Pointer Dereference", }, notes: [ { category: "other", text: "NULL Pointer Dereference", title: "CWE-476", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, references: [ { category: "self", summary: "CVE-2025-20045", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-20045.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, ], title: "CVE-2025-20045", }, { cve: "CVE-2025-20058", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, notes: [ { category: "other", text: "Uncontrolled Resource Consumption", title: "CWE-400", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, references: [ { category: "self", summary: "CVE-2025-20058", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-20058.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, ], title: "CVE-2025-20058", }, { cve: "CVE-2025-21087", cwe: { id: "CWE-400", name: "Uncontrolled Resource Consumption", }, notes: [ { category: "other", text: "Uncontrolled Resource Consumption", title: "CWE-400", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, references: [ { category: "self", summary: "CVE-2025-21087", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21087.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, ], title: "CVE-2025-21087", }, { cve: "CVE-2025-21091", cwe: { id: "CWE-401", name: "Missing Release of Memory after Effective Lifetime", }, notes: [ { category: "other", text: "Missing Release of Memory after Effective Lifetime", title: "CWE-401", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, references: [ { category: "self", summary: "CVE-2025-21091", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21091.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, ], title: "CVE-2025-21091", }, { cve: "CVE-2025-22846", cwe: { id: "CWE-404", name: "Improper Resource Shutdown or Release", }, notes: [ { category: "other", text: "Improper Resource Shutdown or Release", title: "CWE-404", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, references: [ { category: "self", summary: "CVE-2025-22846", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-22846.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, ], title: "CVE-2025-22846", }, { cve: "CVE-2025-22891", cwe: { id: "CWE-772", name: "Missing Release of Resource after Effective Lifetime", }, notes: [ { category: "other", text: "Missing Release of Resource after Effective Lifetime", title: "CWE-772", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, references: [ { category: "self", summary: "CVE-2025-22891", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-22891.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, ], title: "CVE-2025-22891", }, { cve: "CVE-2025-23239", cwe: { id: "CWE-77", name: "Improper Neutralization of Special Elements used in a Command ('Command Injection')", }, notes: [ { category: "other", text: "Improper Neutralization of Special Elements used in a Command ('Command Injection')", title: "CWE-77", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, references: [ { category: "self", summary: "CVE-2025-23239", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-23239.json", }, ], scores: [ { cvss_v3: { baseScore: 8.7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N", version: "3.1", }, products: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, ], title: "CVE-2025-23239", }, { cve: "CVE-2025-23412", cwe: { id: "CWE-120", name: "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')", }, notes: [ { category: "other", text: "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')", title: "CWE-120", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, references: [ { category: "self", summary: "CVE-2025-23412", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-23412.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, ], title: "CVE-2025-23412", }, { cve: "CVE-2025-23413", cwe: { id: "CWE-532", name: "Insertion of Sensitive Information into Log File", }, notes: [ { category: "other", text: "Insertion of Sensitive Information into Log File", title: "CWE-532", }, { category: "general", text: "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, references: [ { category: "self", summary: "CVE-2025-23413", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-23413.json", }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, ], title: "CVE-2025-23413", }, { cve: "CVE-2025-23415", cwe: { id: "CWE-345", name: "Insufficient Verification of Data Authenticity", }, notes: [ { category: "other", text: "Insufficient Verification of Data Authenticity", title: "CWE-345", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, references: [ { category: "self", summary: "CVE-2025-23415", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-23415.json", }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", version: "3.1", }, products: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, ], title: "CVE-2025-23415", }, { cve: "CVE-2025-23419", cwe: { id: "CWE-287", name: "Improper Authentication", }, notes: [ { category: "other", text: "Improper Authentication", title: "CWE-287", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, references: [ { category: "self", summary: "CVE-2025-23419", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-23419.json", }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, ], title: "CVE-2025-23419", }, { cve: "CVE-2025-24312", cwe: { id: "CWE-770", name: "Allocation of Resources Without Limits or Throttling", }, notes: [ { category: "other", text: "Allocation of Resources Without Limits or Throttling", title: "CWE-770", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, references: [ { category: "self", summary: "CVE-2025-24312", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24312.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, ], title: "CVE-2025-24312", }, { cve: "CVE-2025-24319", cwe: { id: "CWE-20", name: "Improper Input Validation", }, notes: [ { category: "other", text: "Improper Input Validation", title: "CWE-20", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, references: [ { category: "self", summary: "CVE-2025-24319", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24319.json", }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, ], title: "CVE-2025-24319", }, { cve: "CVE-2025-24320", cwe: { id: "CWE-79", name: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", }, notes: [ { category: "other", text: "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", title: "CWE-79", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, references: [ { category: "self", summary: "CVE-2025-24320", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24320.json", }, ], scores: [ { cvss_v3: { baseScore: 8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, ], title: "CVE-2025-24320", }, { cve: "CVE-2025-24326", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, notes: [ { category: "other", text: "Out-of-bounds Write", title: "CWE-787", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, references: [ { category: "self", summary: "CVE-2025-24326", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24326.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, ], title: "CVE-2025-24326", }, { cve: "CVE-2025-24497", cwe: { id: "CWE-125", name: "Out-of-bounds Read", }, notes: [ { category: "other", text: "Out-of-bounds Read", title: "CWE-125", }, { category: "general", text: "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L", title: "CVSSV4", }, ], product_status: { known_affected: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, references: [ { category: "self", summary: "CVE-2025-24497", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24497.json", }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "CSAFPID-310988", "CSAFPID-636427", "CSAFPID-1620063", "CSAFPID-636429", "CSAFPID-636428", "CSAFPID-842689", "CSAFPID-842688", ], }, ], title: "CVE-2025-24497", }, ], }
opensuse-su-2025:14897-1
Vulnerability from csaf_opensuse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "tomcat10-10.1.35-1.1 on GA media", title: "Title of the patch", }, { category: "description", text: "These are all security issues fixed in the tomcat10-10.1.35-1.1 package on the GA media of openSUSE Tumbleweed.", title: "Description of the patch", }, { category: "details", text: "openSUSE-Tumbleweed-2025-14897", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_14897-1.json", }, { category: "self", summary: "URL for openSUSE-SU-2025:14897-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7OKLY4MUG7KKGPWMJ2OO7BLP5MD4C3UC/", }, { category: "self", summary: "E-Mail link for openSUSE-SU-2025:14897-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7OKLY4MUG7KKGPWMJ2OO7BLP5MD4C3UC/", }, { category: "self", summary: "SUSE CVE CVE-2004-56337 page", url: "https://www.suse.com/security/cve/CVE-2004-56337/", }, { category: "self", summary: "SUSE CVE CVE-2024-56337 page", url: "https://www.suse.com/security/cve/CVE-2024-56337/", }, { category: "self", summary: "SUSE CVE CVE-2025-24813 page", url: "https://www.suse.com/security/cve/CVE-2025-24813/", }, ], title: "tomcat10-10.1.35-1.1 on GA media", tracking: { current_release_date: "2025-03-15T00:00:00Z", generator: { date: "2025-03-15T00:00:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2025:14897-1", initial_release_date: "2025-03-15T00:00:00Z", revision_history: [ { date: "2025-03-15T00:00:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "tomcat10-10.1.35-1.1.aarch64", product: { name: "tomcat10-10.1.35-1.1.aarch64", product_id: "tomcat10-10.1.35-1.1.aarch64", }, }, { category: "product_version", name: "tomcat10-admin-webapps-10.1.35-1.1.aarch64", product: { name: "tomcat10-admin-webapps-10.1.35-1.1.aarch64", product_id: "tomcat10-admin-webapps-10.1.35-1.1.aarch64", }, }, { category: "product_version", name: "tomcat10-doc-10.1.35-1.1.aarch64", product: { name: "tomcat10-doc-10.1.35-1.1.aarch64", product_id: "tomcat10-doc-10.1.35-1.1.aarch64", }, }, { category: "product_version", name: "tomcat10-docs-webapp-10.1.35-1.1.aarch64", product: { name: "tomcat10-docs-webapp-10.1.35-1.1.aarch64", product_id: "tomcat10-docs-webapp-10.1.35-1.1.aarch64", }, }, { category: "product_version", name: "tomcat10-el-5_0-api-10.1.35-1.1.aarch64", product: { name: "tomcat10-el-5_0-api-10.1.35-1.1.aarch64", product_id: "tomcat10-el-5_0-api-10.1.35-1.1.aarch64", }, }, { category: "product_version", name: "tomcat10-embed-10.1.35-1.1.aarch64", product: { name: "tomcat10-embed-10.1.35-1.1.aarch64", product_id: "tomcat10-embed-10.1.35-1.1.aarch64", }, }, { category: "product_version", name: "tomcat10-jsp-3_1-api-10.1.35-1.1.aarch64", product: { name: "tomcat10-jsp-3_1-api-10.1.35-1.1.aarch64", product_id: "tomcat10-jsp-3_1-api-10.1.35-1.1.aarch64", }, }, { category: "product_version", name: "tomcat10-jsvc-10.1.35-1.1.aarch64", product: { name: "tomcat10-jsvc-10.1.35-1.1.aarch64", product_id: "tomcat10-jsvc-10.1.35-1.1.aarch64", }, }, { category: "product_version", name: "tomcat10-lib-10.1.35-1.1.aarch64", product: { name: "tomcat10-lib-10.1.35-1.1.aarch64", product_id: "tomcat10-lib-10.1.35-1.1.aarch64", }, }, { category: "product_version", name: "tomcat10-servlet-6_0-api-10.1.35-1.1.aarch64", product: { name: "tomcat10-servlet-6_0-api-10.1.35-1.1.aarch64", product_id: "tomcat10-servlet-6_0-api-10.1.35-1.1.aarch64", }, }, { category: "product_version", name: "tomcat10-webapps-10.1.35-1.1.aarch64", product: { name: "tomcat10-webapps-10.1.35-1.1.aarch64", product_id: "tomcat10-webapps-10.1.35-1.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "tomcat10-10.1.35-1.1.ppc64le", product: { name: "tomcat10-10.1.35-1.1.ppc64le", product_id: "tomcat10-10.1.35-1.1.ppc64le", }, }, { category: "product_version", name: "tomcat10-admin-webapps-10.1.35-1.1.ppc64le", product: { name: "tomcat10-admin-webapps-10.1.35-1.1.ppc64le", product_id: "tomcat10-admin-webapps-10.1.35-1.1.ppc64le", }, }, { category: "product_version", name: "tomcat10-doc-10.1.35-1.1.ppc64le", product: { name: "tomcat10-doc-10.1.35-1.1.ppc64le", product_id: "tomcat10-doc-10.1.35-1.1.ppc64le", }, }, { category: "product_version", name: "tomcat10-docs-webapp-10.1.35-1.1.ppc64le", product: { name: "tomcat10-docs-webapp-10.1.35-1.1.ppc64le", product_id: "tomcat10-docs-webapp-10.1.35-1.1.ppc64le", }, }, { category: "product_version", name: "tomcat10-el-5_0-api-10.1.35-1.1.ppc64le", product: { name: "tomcat10-el-5_0-api-10.1.35-1.1.ppc64le", product_id: "tomcat10-el-5_0-api-10.1.35-1.1.ppc64le", }, }, { category: "product_version", name: "tomcat10-embed-10.1.35-1.1.ppc64le", product: { name: "tomcat10-embed-10.1.35-1.1.ppc64le", product_id: "tomcat10-embed-10.1.35-1.1.ppc64le", }, }, { category: "product_version", name: "tomcat10-jsp-3_1-api-10.1.35-1.1.ppc64le", product: { name: "tomcat10-jsp-3_1-api-10.1.35-1.1.ppc64le", product_id: "tomcat10-jsp-3_1-api-10.1.35-1.1.ppc64le", }, }, { category: "product_version", name: "tomcat10-jsvc-10.1.35-1.1.ppc64le", product: { name: "tomcat10-jsvc-10.1.35-1.1.ppc64le", product_id: "tomcat10-jsvc-10.1.35-1.1.ppc64le", }, }, { category: "product_version", name: "tomcat10-lib-10.1.35-1.1.ppc64le", product: { name: "tomcat10-lib-10.1.35-1.1.ppc64le", product_id: "tomcat10-lib-10.1.35-1.1.ppc64le", }, }, { category: "product_version", name: "tomcat10-servlet-6_0-api-10.1.35-1.1.ppc64le", product: { name: "tomcat10-servlet-6_0-api-10.1.35-1.1.ppc64le", product_id: "tomcat10-servlet-6_0-api-10.1.35-1.1.ppc64le", }, }, { category: "product_version", name: "tomcat10-webapps-10.1.35-1.1.ppc64le", product: { name: "tomcat10-webapps-10.1.35-1.1.ppc64le", product_id: "tomcat10-webapps-10.1.35-1.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "tomcat10-10.1.35-1.1.s390x", product: { name: "tomcat10-10.1.35-1.1.s390x", product_id: "tomcat10-10.1.35-1.1.s390x", }, }, { category: "product_version", name: "tomcat10-admin-webapps-10.1.35-1.1.s390x", product: { name: "tomcat10-admin-webapps-10.1.35-1.1.s390x", product_id: "tomcat10-admin-webapps-10.1.35-1.1.s390x", }, }, { category: "product_version", name: "tomcat10-doc-10.1.35-1.1.s390x", product: { name: "tomcat10-doc-10.1.35-1.1.s390x", product_id: "tomcat10-doc-10.1.35-1.1.s390x", }, }, { category: "product_version", name: "tomcat10-docs-webapp-10.1.35-1.1.s390x", product: { name: "tomcat10-docs-webapp-10.1.35-1.1.s390x", product_id: "tomcat10-docs-webapp-10.1.35-1.1.s390x", }, }, { category: "product_version", name: "tomcat10-el-5_0-api-10.1.35-1.1.s390x", product: { name: "tomcat10-el-5_0-api-10.1.35-1.1.s390x", product_id: "tomcat10-el-5_0-api-10.1.35-1.1.s390x", }, }, { category: "product_version", name: "tomcat10-embed-10.1.35-1.1.s390x", product: { name: "tomcat10-embed-10.1.35-1.1.s390x", product_id: "tomcat10-embed-10.1.35-1.1.s390x", }, }, { category: "product_version", name: "tomcat10-jsp-3_1-api-10.1.35-1.1.s390x", product: { name: "tomcat10-jsp-3_1-api-10.1.35-1.1.s390x", product_id: "tomcat10-jsp-3_1-api-10.1.35-1.1.s390x", }, }, { category: "product_version", name: "tomcat10-jsvc-10.1.35-1.1.s390x", product: { name: "tomcat10-jsvc-10.1.35-1.1.s390x", product_id: "tomcat10-jsvc-10.1.35-1.1.s390x", }, }, { category: "product_version", name: "tomcat10-lib-10.1.35-1.1.s390x", product: { name: "tomcat10-lib-10.1.35-1.1.s390x", product_id: "tomcat10-lib-10.1.35-1.1.s390x", }, }, { category: "product_version", name: "tomcat10-servlet-6_0-api-10.1.35-1.1.s390x", product: { name: "tomcat10-servlet-6_0-api-10.1.35-1.1.s390x", product_id: "tomcat10-servlet-6_0-api-10.1.35-1.1.s390x", }, }, { category: "product_version", name: "tomcat10-webapps-10.1.35-1.1.s390x", product: { name: "tomcat10-webapps-10.1.35-1.1.s390x", product_id: "tomcat10-webapps-10.1.35-1.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "tomcat10-10.1.35-1.1.x86_64", product: { name: "tomcat10-10.1.35-1.1.x86_64", product_id: "tomcat10-10.1.35-1.1.x86_64", }, }, { category: "product_version", name: "tomcat10-admin-webapps-10.1.35-1.1.x86_64", product: { name: "tomcat10-admin-webapps-10.1.35-1.1.x86_64", product_id: "tomcat10-admin-webapps-10.1.35-1.1.x86_64", }, }, { category: "product_version", name: "tomcat10-doc-10.1.35-1.1.x86_64", product: { name: "tomcat10-doc-10.1.35-1.1.x86_64", product_id: "tomcat10-doc-10.1.35-1.1.x86_64", }, }, { category: "product_version", name: "tomcat10-docs-webapp-10.1.35-1.1.x86_64", product: { name: "tomcat10-docs-webapp-10.1.35-1.1.x86_64", product_id: "tomcat10-docs-webapp-10.1.35-1.1.x86_64", }, }, { category: "product_version", name: "tomcat10-el-5_0-api-10.1.35-1.1.x86_64", product: { name: "tomcat10-el-5_0-api-10.1.35-1.1.x86_64", product_id: "tomcat10-el-5_0-api-10.1.35-1.1.x86_64", }, }, { category: "product_version", name: "tomcat10-embed-10.1.35-1.1.x86_64", product: { name: "tomcat10-embed-10.1.35-1.1.x86_64", product_id: "tomcat10-embed-10.1.35-1.1.x86_64", }, }, { category: "product_version", name: "tomcat10-jsp-3_1-api-10.1.35-1.1.x86_64", product: { name: "tomcat10-jsp-3_1-api-10.1.35-1.1.x86_64", product_id: "tomcat10-jsp-3_1-api-10.1.35-1.1.x86_64", }, }, { category: "product_version", name: "tomcat10-jsvc-10.1.35-1.1.x86_64", product: { name: "tomcat10-jsvc-10.1.35-1.1.x86_64", product_id: "tomcat10-jsvc-10.1.35-1.1.x86_64", }, }, { category: "product_version", name: "tomcat10-lib-10.1.35-1.1.x86_64", product: { name: "tomcat10-lib-10.1.35-1.1.x86_64", product_id: "tomcat10-lib-10.1.35-1.1.x86_64", }, }, { category: "product_version", name: "tomcat10-servlet-6_0-api-10.1.35-1.1.x86_64", product: { name: "tomcat10-servlet-6_0-api-10.1.35-1.1.x86_64", product_id: "tomcat10-servlet-6_0-api-10.1.35-1.1.x86_64", }, }, { category: "product_version", name: "tomcat10-webapps-10.1.35-1.1.x86_64", product: { name: "tomcat10-webapps-10.1.35-1.1.x86_64", product_id: "tomcat10-webapps-10.1.35-1.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Tumbleweed", product: { name: "openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed", product_identification_helper: { cpe: "cpe:/o:opensuse:tumbleweed", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "tomcat10-10.1.35-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.aarch64", }, product_reference: "tomcat10-10.1.35-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-10.1.35-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.ppc64le", }, product_reference: "tomcat10-10.1.35-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-10.1.35-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.s390x", }, product_reference: "tomcat10-10.1.35-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-10.1.35-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.x86_64", }, product_reference: "tomcat10-10.1.35-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-admin-webapps-10.1.35-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.aarch64", }, product_reference: "tomcat10-admin-webapps-10.1.35-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-admin-webapps-10.1.35-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.ppc64le", }, product_reference: "tomcat10-admin-webapps-10.1.35-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-admin-webapps-10.1.35-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.s390x", }, product_reference: "tomcat10-admin-webapps-10.1.35-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-admin-webapps-10.1.35-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.x86_64", }, product_reference: "tomcat10-admin-webapps-10.1.35-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-doc-10.1.35-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.aarch64", }, product_reference: "tomcat10-doc-10.1.35-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-doc-10.1.35-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.ppc64le", }, product_reference: "tomcat10-doc-10.1.35-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-doc-10.1.35-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.s390x", }, product_reference: "tomcat10-doc-10.1.35-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-doc-10.1.35-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.x86_64", }, product_reference: "tomcat10-doc-10.1.35-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-docs-webapp-10.1.35-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.aarch64", }, product_reference: "tomcat10-docs-webapp-10.1.35-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-docs-webapp-10.1.35-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.ppc64le", }, product_reference: "tomcat10-docs-webapp-10.1.35-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-docs-webapp-10.1.35-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.s390x", }, product_reference: "tomcat10-docs-webapp-10.1.35-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-docs-webapp-10.1.35-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.x86_64", }, product_reference: "tomcat10-docs-webapp-10.1.35-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-el-5_0-api-10.1.35-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.aarch64", }, product_reference: "tomcat10-el-5_0-api-10.1.35-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-el-5_0-api-10.1.35-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.ppc64le", }, product_reference: "tomcat10-el-5_0-api-10.1.35-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-el-5_0-api-10.1.35-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.s390x", }, product_reference: "tomcat10-el-5_0-api-10.1.35-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-el-5_0-api-10.1.35-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.x86_64", }, product_reference: "tomcat10-el-5_0-api-10.1.35-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-embed-10.1.35-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.aarch64", }, product_reference: "tomcat10-embed-10.1.35-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-embed-10.1.35-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.ppc64le", }, product_reference: "tomcat10-embed-10.1.35-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-embed-10.1.35-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.s390x", }, product_reference: "tomcat10-embed-10.1.35-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-embed-10.1.35-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.x86_64", }, product_reference: "tomcat10-embed-10.1.35-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-jsp-3_1-api-10.1.35-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.aarch64", }, product_reference: "tomcat10-jsp-3_1-api-10.1.35-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-jsp-3_1-api-10.1.35-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.ppc64le", }, product_reference: "tomcat10-jsp-3_1-api-10.1.35-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-jsp-3_1-api-10.1.35-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.s390x", }, product_reference: "tomcat10-jsp-3_1-api-10.1.35-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-jsp-3_1-api-10.1.35-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.x86_64", }, product_reference: "tomcat10-jsp-3_1-api-10.1.35-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-jsvc-10.1.35-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.aarch64", }, product_reference: "tomcat10-jsvc-10.1.35-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-jsvc-10.1.35-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.ppc64le", }, product_reference: "tomcat10-jsvc-10.1.35-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-jsvc-10.1.35-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.s390x", }, product_reference: "tomcat10-jsvc-10.1.35-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-jsvc-10.1.35-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.x86_64", }, product_reference: "tomcat10-jsvc-10.1.35-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-lib-10.1.35-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.aarch64", }, product_reference: "tomcat10-lib-10.1.35-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-lib-10.1.35-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.ppc64le", }, product_reference: "tomcat10-lib-10.1.35-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-lib-10.1.35-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.s390x", }, product_reference: "tomcat10-lib-10.1.35-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-lib-10.1.35-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.x86_64", }, product_reference: "tomcat10-lib-10.1.35-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-servlet-6_0-api-10.1.35-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.aarch64", }, product_reference: "tomcat10-servlet-6_0-api-10.1.35-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-servlet-6_0-api-10.1.35-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.ppc64le", }, product_reference: "tomcat10-servlet-6_0-api-10.1.35-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-servlet-6_0-api-10.1.35-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.s390x", }, product_reference: "tomcat10-servlet-6_0-api-10.1.35-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-servlet-6_0-api-10.1.35-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.x86_64", }, product_reference: "tomcat10-servlet-6_0-api-10.1.35-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-webapps-10.1.35-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.aarch64", }, product_reference: "tomcat10-webapps-10.1.35-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-webapps-10.1.35-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.ppc64le", }, product_reference: "tomcat10-webapps-10.1.35-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-webapps-10.1.35-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.s390x", }, product_reference: "tomcat10-webapps-10.1.35-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat10-webapps-10.1.35-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.x86_64", }, product_reference: "tomcat10-webapps-10.1.35-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, ], }, vulnerabilities: [ { cve: "CVE-2004-56337", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2004-56337", }, ], notes: [ { category: "general", text: "unknown", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2004-56337", url: "https://www.suse.com/security/cve/CVE-2004-56337", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-03-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2004-56337", }, { cve: "CVE-2024-56337", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-56337", }, ], notes: [ { category: "general", text: "Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache Tomcat.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.\n\nThe mitigation for CVE-2024-50379 was incomplete.\n\nUsers running Tomcat on a case insensitive file system with the default servlet write enabled (readonly initialisation \nparameter set to the non-default value of false) may need additional configuration to fully mitigate CVE-2024-50379 depending on which version of Java they are using with Tomcat:\n- running on Java 8 or Java 11: the system property sun.io.useCanonCaches must be explicitly set to false (it defaults to true)\n- running on Java 17: the system property sun.io.useCanonCaches, if set, must be set to false (it defaults to false)\n- running on Java 21 onwards: no further configuration is required (the system property and the problematic cache have been removed)\n\nTomcat 11.0.3, 10.1.35 and 9.0.99 onwards will include checks that sun.io.useCanonCaches is set appropriately before allowing the default servlet to be write enabled on a case insensitive file system. Tomcat will also set sun.io.useCanonCaches to false by default where it can.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-56337", url: "https://www.suse.com/security/cve/CVE-2024-56337", }, { category: "external", summary: "SUSE Bug 1234663 for CVE-2024-56337", url: "https://bugzilla.suse.com/1234663", }, { category: "external", summary: "SUSE Bug 1236809 for CVE-2024-56337", url: "https://bugzilla.suse.com/1236809", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-03-15T00:00:00Z", details: "important", }, ], title: "CVE-2024-56337", }, { cve: "CVE-2025-24813", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2025-24813", }, ], notes: [ { category: "general", text: "Path Equivalence: 'file.Name' (Internal Dot) leading to Remote Code Execution and/or Information disclosure and/or malicious content added to uploaded files via write enabled Default Servlet in Apache Tomcat.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98.\n\nIf all of the following were true, a malicious user was able to view security sensitive files and/or inject content into those files:\n- writes enabled for the default servlet (disabled by default)\n- support for partial PUT (enabled by default)\n- a target URL for security sensitive uploads that was a sub-directory of a target URL for public uploads\n- attacker knowledge of the names of security sensitive files being uploaded\n- the security sensitive files also being uploaded via partial PUT\n\nIf all of the following were true, a malicious user was able to perform remote code execution:\n- writes enabled for the default servlet (disabled by default)\n- support for partial PUT (enabled by default)\n- application was using Tomcat's file based session persistence with the default storage location\n- application included a library that may be leveraged in a deserialization attack\n\nUsers are recommended to upgrade to version 11.0.3, 10.1.35 or 9.0.99, which fixes the issue.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2025-24813", url: "https://www.suse.com/security/cve/CVE-2025-24813", }, { category: "external", summary: "SUSE Bug 1239302 for CVE-2025-24813", url: "https://bugzilla.suse.com/1239302", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-admin-webapps-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-doc-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-docs-webapp-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-el-5_0-api-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-embed-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsp-3_1-api-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-jsvc-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-lib-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-servlet-6_0-api-10.1.35-1.1.x86_64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.aarch64", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.ppc64le", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.s390x", "openSUSE Tumbleweed:tomcat10-webapps-10.1.35-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-03-15T00:00:00Z", details: "important", }, ], title: "CVE-2025-24813", }, ], }
opensuse-su-2025:14896-1
Vulnerability from csaf_opensuse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "tomcat-9.0.99-1.1 on GA media", title: "Title of the patch", }, { category: "description", text: "These are all security issues fixed in the tomcat-9.0.99-1.1 package on the GA media of openSUSE Tumbleweed.", title: "Description of the patch", }, { category: "details", text: "openSUSE-Tumbleweed-2025-14896", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_14896-1.json", }, { category: "self", summary: "URL for openSUSE-SU-2025:14896-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WQRQ6JSFISH4LSDOH7IDJHNYPKMGUF5X/", }, { category: "self", summary: "E-Mail link for openSUSE-SU-2025:14896-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WQRQ6JSFISH4LSDOH7IDJHNYPKMGUF5X/", }, { category: "self", summary: "SUSE CVE CVE-2004-56337 page", url: "https://www.suse.com/security/cve/CVE-2004-56337/", }, { category: "self", summary: "SUSE CVE CVE-2024-56337 page", url: "https://www.suse.com/security/cve/CVE-2024-56337/", }, { category: "self", summary: "SUSE CVE CVE-2025-24813 page", url: "https://www.suse.com/security/cve/CVE-2025-24813/", }, ], title: "tomcat-9.0.99-1.1 on GA media", tracking: { current_release_date: "2025-03-15T00:00:00Z", generator: { date: "2025-03-15T00:00:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2025:14896-1", initial_release_date: "2025-03-15T00:00:00Z", revision_history: [ { date: "2025-03-15T00:00:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "tomcat-9.0.99-1.1.aarch64", product: { name: "tomcat-9.0.99-1.1.aarch64", product_id: "tomcat-9.0.99-1.1.aarch64", }, }, { category: "product_version", name: "tomcat-admin-webapps-9.0.99-1.1.aarch64", product: { name: "tomcat-admin-webapps-9.0.99-1.1.aarch64", product_id: "tomcat-admin-webapps-9.0.99-1.1.aarch64", }, }, { category: "product_version", name: "tomcat-docs-webapp-9.0.99-1.1.aarch64", product: { name: "tomcat-docs-webapp-9.0.99-1.1.aarch64", product_id: "tomcat-docs-webapp-9.0.99-1.1.aarch64", }, }, { category: "product_version", name: "tomcat-el-3_0-api-9.0.99-1.1.aarch64", product: { name: "tomcat-el-3_0-api-9.0.99-1.1.aarch64", product_id: "tomcat-el-3_0-api-9.0.99-1.1.aarch64", }, }, { category: "product_version", name: "tomcat-embed-9.0.99-1.1.aarch64", product: { name: "tomcat-embed-9.0.99-1.1.aarch64", product_id: "tomcat-embed-9.0.99-1.1.aarch64", }, }, { category: "product_version", name: "tomcat-javadoc-9.0.99-1.1.aarch64", product: { name: "tomcat-javadoc-9.0.99-1.1.aarch64", product_id: "tomcat-javadoc-9.0.99-1.1.aarch64", }, }, { category: "product_version", name: "tomcat-jsp-2_3-api-9.0.99-1.1.aarch64", product: { name: "tomcat-jsp-2_3-api-9.0.99-1.1.aarch64", product_id: "tomcat-jsp-2_3-api-9.0.99-1.1.aarch64", }, }, { category: "product_version", name: "tomcat-jsvc-9.0.99-1.1.aarch64", product: { name: "tomcat-jsvc-9.0.99-1.1.aarch64", product_id: "tomcat-jsvc-9.0.99-1.1.aarch64", }, }, { category: "product_version", name: "tomcat-lib-9.0.99-1.1.aarch64", product: { name: "tomcat-lib-9.0.99-1.1.aarch64", product_id: "tomcat-lib-9.0.99-1.1.aarch64", }, }, { category: "product_version", name: "tomcat-servlet-4_0-api-9.0.99-1.1.aarch64", product: { name: "tomcat-servlet-4_0-api-9.0.99-1.1.aarch64", product_id: "tomcat-servlet-4_0-api-9.0.99-1.1.aarch64", }, }, { category: "product_version", name: "tomcat-webapps-9.0.99-1.1.aarch64", product: { name: "tomcat-webapps-9.0.99-1.1.aarch64", product_id: "tomcat-webapps-9.0.99-1.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "tomcat-9.0.99-1.1.ppc64le", product: { name: "tomcat-9.0.99-1.1.ppc64le", product_id: "tomcat-9.0.99-1.1.ppc64le", }, }, { category: "product_version", name: "tomcat-admin-webapps-9.0.99-1.1.ppc64le", product: { name: "tomcat-admin-webapps-9.0.99-1.1.ppc64le", product_id: "tomcat-admin-webapps-9.0.99-1.1.ppc64le", }, }, { category: "product_version", name: "tomcat-docs-webapp-9.0.99-1.1.ppc64le", product: { name: "tomcat-docs-webapp-9.0.99-1.1.ppc64le", product_id: "tomcat-docs-webapp-9.0.99-1.1.ppc64le", }, }, { category: "product_version", name: "tomcat-el-3_0-api-9.0.99-1.1.ppc64le", product: { name: "tomcat-el-3_0-api-9.0.99-1.1.ppc64le", product_id: "tomcat-el-3_0-api-9.0.99-1.1.ppc64le", }, }, { category: "product_version", name: "tomcat-embed-9.0.99-1.1.ppc64le", product: { name: "tomcat-embed-9.0.99-1.1.ppc64le", product_id: "tomcat-embed-9.0.99-1.1.ppc64le", }, }, { category: "product_version", name: "tomcat-javadoc-9.0.99-1.1.ppc64le", product: { name: "tomcat-javadoc-9.0.99-1.1.ppc64le", product_id: "tomcat-javadoc-9.0.99-1.1.ppc64le", }, }, { category: "product_version", name: "tomcat-jsp-2_3-api-9.0.99-1.1.ppc64le", product: { name: "tomcat-jsp-2_3-api-9.0.99-1.1.ppc64le", product_id: "tomcat-jsp-2_3-api-9.0.99-1.1.ppc64le", }, }, { category: "product_version", name: "tomcat-jsvc-9.0.99-1.1.ppc64le", product: { name: "tomcat-jsvc-9.0.99-1.1.ppc64le", product_id: "tomcat-jsvc-9.0.99-1.1.ppc64le", }, }, { category: "product_version", name: "tomcat-lib-9.0.99-1.1.ppc64le", product: { name: "tomcat-lib-9.0.99-1.1.ppc64le", product_id: "tomcat-lib-9.0.99-1.1.ppc64le", }, }, { category: "product_version", name: "tomcat-servlet-4_0-api-9.0.99-1.1.ppc64le", product: { name: "tomcat-servlet-4_0-api-9.0.99-1.1.ppc64le", product_id: "tomcat-servlet-4_0-api-9.0.99-1.1.ppc64le", }, }, { category: "product_version", name: "tomcat-webapps-9.0.99-1.1.ppc64le", product: { name: "tomcat-webapps-9.0.99-1.1.ppc64le", product_id: "tomcat-webapps-9.0.99-1.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "tomcat-9.0.99-1.1.s390x", product: { name: "tomcat-9.0.99-1.1.s390x", product_id: "tomcat-9.0.99-1.1.s390x", }, }, { category: "product_version", name: "tomcat-admin-webapps-9.0.99-1.1.s390x", product: { name: "tomcat-admin-webapps-9.0.99-1.1.s390x", product_id: "tomcat-admin-webapps-9.0.99-1.1.s390x", }, }, { category: "product_version", name: "tomcat-docs-webapp-9.0.99-1.1.s390x", product: { name: "tomcat-docs-webapp-9.0.99-1.1.s390x", product_id: "tomcat-docs-webapp-9.0.99-1.1.s390x", }, }, { category: "product_version", name: "tomcat-el-3_0-api-9.0.99-1.1.s390x", product: { name: "tomcat-el-3_0-api-9.0.99-1.1.s390x", product_id: "tomcat-el-3_0-api-9.0.99-1.1.s390x", }, }, { category: "product_version", name: "tomcat-embed-9.0.99-1.1.s390x", product: { name: "tomcat-embed-9.0.99-1.1.s390x", product_id: "tomcat-embed-9.0.99-1.1.s390x", }, }, { category: "product_version", name: "tomcat-javadoc-9.0.99-1.1.s390x", product: { name: "tomcat-javadoc-9.0.99-1.1.s390x", product_id: "tomcat-javadoc-9.0.99-1.1.s390x", }, }, { category: "product_version", name: "tomcat-jsp-2_3-api-9.0.99-1.1.s390x", product: { name: "tomcat-jsp-2_3-api-9.0.99-1.1.s390x", product_id: "tomcat-jsp-2_3-api-9.0.99-1.1.s390x", }, }, { category: "product_version", name: "tomcat-jsvc-9.0.99-1.1.s390x", product: { name: "tomcat-jsvc-9.0.99-1.1.s390x", product_id: "tomcat-jsvc-9.0.99-1.1.s390x", }, }, { category: "product_version", name: "tomcat-lib-9.0.99-1.1.s390x", product: { name: "tomcat-lib-9.0.99-1.1.s390x", product_id: "tomcat-lib-9.0.99-1.1.s390x", }, }, { category: "product_version", name: "tomcat-servlet-4_0-api-9.0.99-1.1.s390x", product: { name: "tomcat-servlet-4_0-api-9.0.99-1.1.s390x", product_id: "tomcat-servlet-4_0-api-9.0.99-1.1.s390x", }, }, { category: "product_version", name: "tomcat-webapps-9.0.99-1.1.s390x", product: { name: "tomcat-webapps-9.0.99-1.1.s390x", product_id: "tomcat-webapps-9.0.99-1.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "tomcat-9.0.99-1.1.x86_64", product: { name: "tomcat-9.0.99-1.1.x86_64", product_id: "tomcat-9.0.99-1.1.x86_64", }, }, { category: "product_version", name: "tomcat-admin-webapps-9.0.99-1.1.x86_64", product: { name: "tomcat-admin-webapps-9.0.99-1.1.x86_64", product_id: "tomcat-admin-webapps-9.0.99-1.1.x86_64", }, }, { category: "product_version", name: "tomcat-docs-webapp-9.0.99-1.1.x86_64", product: { name: "tomcat-docs-webapp-9.0.99-1.1.x86_64", product_id: "tomcat-docs-webapp-9.0.99-1.1.x86_64", }, }, { category: "product_version", name: "tomcat-el-3_0-api-9.0.99-1.1.x86_64", product: { name: "tomcat-el-3_0-api-9.0.99-1.1.x86_64", product_id: "tomcat-el-3_0-api-9.0.99-1.1.x86_64", }, }, { category: "product_version", name: "tomcat-embed-9.0.99-1.1.x86_64", product: { name: "tomcat-embed-9.0.99-1.1.x86_64", product_id: "tomcat-embed-9.0.99-1.1.x86_64", }, }, { category: "product_version", name: "tomcat-javadoc-9.0.99-1.1.x86_64", product: { name: "tomcat-javadoc-9.0.99-1.1.x86_64", product_id: "tomcat-javadoc-9.0.99-1.1.x86_64", }, }, { category: "product_version", name: "tomcat-jsp-2_3-api-9.0.99-1.1.x86_64", product: { name: "tomcat-jsp-2_3-api-9.0.99-1.1.x86_64", product_id: "tomcat-jsp-2_3-api-9.0.99-1.1.x86_64", }, }, { category: "product_version", name: "tomcat-jsvc-9.0.99-1.1.x86_64", product: { name: "tomcat-jsvc-9.0.99-1.1.x86_64", product_id: "tomcat-jsvc-9.0.99-1.1.x86_64", }, }, { category: "product_version", name: "tomcat-lib-9.0.99-1.1.x86_64", product: { name: "tomcat-lib-9.0.99-1.1.x86_64", product_id: "tomcat-lib-9.0.99-1.1.x86_64", }, }, { category: "product_version", name: "tomcat-servlet-4_0-api-9.0.99-1.1.x86_64", product: { name: "tomcat-servlet-4_0-api-9.0.99-1.1.x86_64", product_id: "tomcat-servlet-4_0-api-9.0.99-1.1.x86_64", }, }, { category: "product_version", name: "tomcat-webapps-9.0.99-1.1.x86_64", product: { name: "tomcat-webapps-9.0.99-1.1.x86_64", product_id: "tomcat-webapps-9.0.99-1.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Tumbleweed", product: { name: "openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed", product_identification_helper: { cpe: "cpe:/o:opensuse:tumbleweed", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "tomcat-9.0.99-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-9.0.99-1.1.aarch64", }, product_reference: "tomcat-9.0.99-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-9.0.99-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-9.0.99-1.1.ppc64le", }, product_reference: "tomcat-9.0.99-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-9.0.99-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-9.0.99-1.1.s390x", }, product_reference: "tomcat-9.0.99-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-9.0.99-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-9.0.99-1.1.x86_64", }, product_reference: "tomcat-9.0.99-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-admin-webapps-9.0.99-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.aarch64", }, product_reference: "tomcat-admin-webapps-9.0.99-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-admin-webapps-9.0.99-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.ppc64le", }, product_reference: "tomcat-admin-webapps-9.0.99-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-admin-webapps-9.0.99-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.s390x", }, product_reference: "tomcat-admin-webapps-9.0.99-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-admin-webapps-9.0.99-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.x86_64", }, product_reference: "tomcat-admin-webapps-9.0.99-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-docs-webapp-9.0.99-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.aarch64", }, product_reference: "tomcat-docs-webapp-9.0.99-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-docs-webapp-9.0.99-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.ppc64le", }, product_reference: "tomcat-docs-webapp-9.0.99-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-docs-webapp-9.0.99-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.s390x", }, product_reference: "tomcat-docs-webapp-9.0.99-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-docs-webapp-9.0.99-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.x86_64", }, product_reference: "tomcat-docs-webapp-9.0.99-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-el-3_0-api-9.0.99-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.aarch64", }, product_reference: "tomcat-el-3_0-api-9.0.99-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-el-3_0-api-9.0.99-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.ppc64le", }, product_reference: "tomcat-el-3_0-api-9.0.99-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-el-3_0-api-9.0.99-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.s390x", }, product_reference: "tomcat-el-3_0-api-9.0.99-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-el-3_0-api-9.0.99-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.x86_64", }, product_reference: "tomcat-el-3_0-api-9.0.99-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-embed-9.0.99-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.aarch64", }, product_reference: "tomcat-embed-9.0.99-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-embed-9.0.99-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.ppc64le", }, product_reference: "tomcat-embed-9.0.99-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-embed-9.0.99-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.s390x", }, product_reference: "tomcat-embed-9.0.99-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-embed-9.0.99-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.x86_64", }, product_reference: "tomcat-embed-9.0.99-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-javadoc-9.0.99-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.aarch64", }, product_reference: "tomcat-javadoc-9.0.99-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-javadoc-9.0.99-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.ppc64le", }, product_reference: "tomcat-javadoc-9.0.99-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-javadoc-9.0.99-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.s390x", }, product_reference: "tomcat-javadoc-9.0.99-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-javadoc-9.0.99-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.x86_64", }, product_reference: "tomcat-javadoc-9.0.99-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsp-2_3-api-9.0.99-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.aarch64", }, product_reference: "tomcat-jsp-2_3-api-9.0.99-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsp-2_3-api-9.0.99-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.ppc64le", }, product_reference: "tomcat-jsp-2_3-api-9.0.99-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsp-2_3-api-9.0.99-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.s390x", }, product_reference: "tomcat-jsp-2_3-api-9.0.99-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsp-2_3-api-9.0.99-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.x86_64", }, product_reference: "tomcat-jsp-2_3-api-9.0.99-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsvc-9.0.99-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.aarch64", }, product_reference: "tomcat-jsvc-9.0.99-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsvc-9.0.99-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.ppc64le", }, product_reference: "tomcat-jsvc-9.0.99-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsvc-9.0.99-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.s390x", }, product_reference: "tomcat-jsvc-9.0.99-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsvc-9.0.99-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.x86_64", }, product_reference: "tomcat-jsvc-9.0.99-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-lib-9.0.99-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.aarch64", }, product_reference: "tomcat-lib-9.0.99-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-lib-9.0.99-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.ppc64le", }, product_reference: "tomcat-lib-9.0.99-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-lib-9.0.99-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.s390x", }, product_reference: "tomcat-lib-9.0.99-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-lib-9.0.99-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.x86_64", }, product_reference: "tomcat-lib-9.0.99-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-servlet-4_0-api-9.0.99-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.aarch64", }, product_reference: "tomcat-servlet-4_0-api-9.0.99-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-servlet-4_0-api-9.0.99-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.ppc64le", }, product_reference: "tomcat-servlet-4_0-api-9.0.99-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-servlet-4_0-api-9.0.99-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.s390x", }, product_reference: "tomcat-servlet-4_0-api-9.0.99-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-servlet-4_0-api-9.0.99-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.x86_64", }, product_reference: "tomcat-servlet-4_0-api-9.0.99-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-webapps-9.0.99-1.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.aarch64", }, product_reference: "tomcat-webapps-9.0.99-1.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-webapps-9.0.99-1.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.ppc64le", }, product_reference: "tomcat-webapps-9.0.99-1.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-webapps-9.0.99-1.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.s390x", }, product_reference: "tomcat-webapps-9.0.99-1.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "tomcat-webapps-9.0.99-1.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.x86_64", }, product_reference: "tomcat-webapps-9.0.99-1.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, ], }, vulnerabilities: [ { cve: "CVE-2004-56337", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2004-56337", }, ], notes: [ { category: "general", text: "unknown", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:tomcat-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2004-56337", url: "https://www.suse.com/security/cve/CVE-2004-56337", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:tomcat-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-03-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2004-56337", }, { cve: "CVE-2024-56337", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-56337", }, ], notes: [ { category: "general", text: "Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache Tomcat.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.\n\nThe mitigation for CVE-2024-50379 was incomplete.\n\nUsers running Tomcat on a case insensitive file system with the default servlet write enabled (readonly initialisation \nparameter set to the non-default value of false) may need additional configuration to fully mitigate CVE-2024-50379 depending on which version of Java they are using with Tomcat:\n- running on Java 8 or Java 11: the system property sun.io.useCanonCaches must be explicitly set to false (it defaults to true)\n- running on Java 17: the system property sun.io.useCanonCaches, if set, must be set to false (it defaults to false)\n- running on Java 21 onwards: no further configuration is required (the system property and the problematic cache have been removed)\n\nTomcat 11.0.3, 10.1.35 and 9.0.99 onwards will include checks that sun.io.useCanonCaches is set appropriately before allowing the default servlet to be write enabled on a case insensitive file system. Tomcat will also set sun.io.useCanonCaches to false by default where it can.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:tomcat-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2024-56337", url: "https://www.suse.com/security/cve/CVE-2024-56337", }, { category: "external", summary: "SUSE Bug 1234663 for CVE-2024-56337", url: "https://bugzilla.suse.com/1234663", }, { category: "external", summary: "SUSE Bug 1236809 for CVE-2024-56337", url: "https://bugzilla.suse.com/1236809", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:tomcat-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:tomcat-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-03-15T00:00:00Z", details: "important", }, ], title: "CVE-2024-56337", }, { cve: "CVE-2025-24813", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2025-24813", }, ], notes: [ { category: "general", text: "Path Equivalence: 'file.Name' (Internal Dot) leading to Remote Code Execution and/or Information disclosure and/or malicious content added to uploaded files via write enabled Default Servlet in Apache Tomcat.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98.\n\nIf all of the following were true, a malicious user was able to view security sensitive files and/or inject content into those files:\n- writes enabled for the default servlet (disabled by default)\n- support for partial PUT (enabled by default)\n- a target URL for security sensitive uploads that was a sub-directory of a target URL for public uploads\n- attacker knowledge of the names of security sensitive files being uploaded\n- the security sensitive files also being uploaded via partial PUT\n\nIf all of the following were true, a malicious user was able to perform remote code execution:\n- writes enabled for the default servlet (disabled by default)\n- support for partial PUT (enabled by default)\n- application was using Tomcat's file based session persistence with the default storage location\n- application included a library that may be leveraged in a deserialization attack\n\nUsers are recommended to upgrade to version 11.0.3, 10.1.35 or 9.0.99, which fixes the issue.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:tomcat-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2025-24813", url: "https://www.suse.com/security/cve/CVE-2025-24813", }, { category: "external", summary: "SUSE Bug 1239302 for CVE-2025-24813", url: "https://bugzilla.suse.com/1239302", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:tomcat-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:tomcat-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-admin-webapps-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-docs-webapp-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-el-3_0-api-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-embed-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-javadoc-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsp-2_3-api-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-jsvc-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-lib-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-servlet-4_0-api-9.0.99-1.1.x86_64", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.aarch64", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.ppc64le", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.s390x", "openSUSE Tumbleweed:tomcat-webapps-9.0.99-1.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2025-03-15T00:00:00Z", details: "important", }, ], title: "CVE-2025-24813", }, ], }
wid-sec-w-2024-3744
Vulnerability from csaf_certbund
Notes
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Apache Tomcat ist ein Web-Applikationsserver für verschiedene Plattformen.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in Apache Tomcat ausnutzen, um beliebigen Programmcode auszuführen.", title: "Angriff", }, { category: "general", text: "- Linux\n- NetApp Appliance\n- UNIX\n- Windows", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2024-3744 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3744.json", }, { category: "self", summary: "WID-SEC-2024-3744 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3744", }, { category: "external", summary: "OSS Security Mailing List vom 2024-12-22", url: "https://seclists.org/oss-sec/2024/q4/164", }, { category: "external", summary: "Red Hat Bugzilla vom 2024-12-22", url: "https://bugzilla.redhat.com/show_bug.cgi?id=2333521", }, { category: "external", summary: "GitHub Advisory Database vom 2024-12-22", url: "https://github.com/advisories/GHSA-27hp-xhwr-wr2m", }, { category: "external", summary: "NetApp Security Advisory NTAP-20250103-0002 vom 2025-01-03", url: "https://security.netapp.com/advisory/ntap-20250103-0002/", }, { category: "external", summary: "IBM Security Bulletin 7180700 vom 2025-01-10", url: "https://www.ibm.com/support/pages/node/7180700", }, { category: "external", summary: "Debian Security Advisory DLA-4017 vom 2025-01-17", url: "https://lists.debian.org/debian-lts-announce/2025/01/msg00009.html", }, { category: "external", summary: "Debian Security Advisory DSA-5845 vom 2025-01-17", url: "https://lists.debian.org/debian-security-announce/2025/msg00007.html", }, ], source_lang: "en-US", title: "Apache Tomcat: Schwachstelle ermöglicht Codeausführung", tracking: { current_release_date: "2025-01-19T23:00:00.000+00:00", generator: { date: "2025-01-20T09:18:26.739+00:00", engine: { name: "BSI-WID", version: "1.3.10", }, }, id: "WID-SEC-W-2024-3744", initial_release_date: "2024-12-22T23:00:00.000+00:00", revision_history: [ { date: "2024-12-22T23:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2024-12-23T23:00:00.000+00:00", number: "2", summary: "Anpassung der Produkt-Versionen", }, { date: "2025-01-02T23:00:00.000+00:00", number: "3", summary: "Neue Updates von NetApp aufgenommen", }, { date: "2025-01-12T23:00:00.000+00:00", number: "4", summary: "Neue Updates von IBM aufgenommen", }, { date: "2025-01-16T23:00:00.000+00:00", number: "5", summary: "Neue Updates von Debian aufgenommen", }, { date: "2025-01-19T23:00:00.000+00:00", number: "6", summary: "Neue Updates von Debian aufgenommen", }, ], status: "final", version: "6", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version_range", name: "<11.0.2", product: { name: "Apache Tomcat <11.0.2", product_id: "T039886", }, }, { category: "product_version", name: "11.0.2", product: { name: "Apache Tomcat 11.0.2", product_id: "T039886-fixed", product_identification_helper: { cpe: "cpe:/a:apache:tomcat:11.0.2", }, }, }, { category: "product_version_range", name: "<10.1.34", product: { name: "Apache Tomcat <10.1.34", product_id: "T039887", }, }, { category: "product_version", name: "10.1.34", product: { name: "Apache Tomcat 10.1.34", product_id: "T039887-fixed", product_identification_helper: { cpe: "cpe:/a:apache:tomcat:10.1.34", }, }, }, { category: "product_version_range", name: "<9.0.98", product: { name: "Apache Tomcat <9.0.98", product_id: "T039888", }, }, { category: "product_version", name: "9.0.98", product: { name: "Apache Tomcat 9.0.98", product_id: "T039888-fixed", product_identification_helper: { cpe: "cpe:/a:apache:tomcat:9.0.98", }, }, }, ], category: "product_name", name: "Tomcat", }, ], category: "vendor", name: "Apache", }, { branches: [ { category: "product_name", name: "Debian Linux", product: { name: "Debian Linux", product_id: "2951", product_identification_helper: { cpe: "cpe:/o:debian:debian_linux:-", }, }, }, ], category: "vendor", name: "Debian", }, { branches: [ { category: "product_name", name: "IBM Integration Bus", product: { name: "IBM Integration Bus", product_id: "T039654", product_identification_helper: { cpe: "cpe:/a:ibm:integration_bus:for_zos", }, }, }, ], category: "vendor", name: "IBM", }, { branches: [ { branches: [ { category: "product_version", name: "for Linux", product: { name: "NetApp ActiveIQ Unified Manager for Linux", product_id: "T023548", product_identification_helper: { cpe: "cpe:/a:netapp:active_iq_unified_manager:for_linux", }, }, }, { category: "product_version", name: "for VMware vSphere", product: { name: "NetApp ActiveIQ Unified Manager for VMware vSphere", product_id: "T025152", product_identification_helper: { cpe: "cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere", }, }, }, { category: "product_version", name: "for Microsoft Windows", product: { name: "NetApp ActiveIQ Unified Manager for Microsoft Windows", product_id: "T025631", product_identification_helper: { cpe: "cpe:/a:netapp:active_iq_unified_manager:for_microsoft_windows", }, }, }, ], category: "product_name", name: "ActiveIQ Unified Manager", }, ], category: "vendor", name: "NetApp", }, ], }, vulnerabilities: [ { cve: "CVE-2024-56337", notes: [ { category: "description", text: "Es besteht eine Schwachstelle in Apache Tomcat. Dieser Fehler existiert wegen einer Time-of-check Time-of-use (TOCTOU) Race Condition in der JSP-Kompilierung. Ein entfernter, anonymer Angreifer kann diese Schwachstelle zur Ausführung von beliebigem Code ausnutzen.", }, ], product_status: { known_affected: [ "T023548", "T025152", "2951", "T025631", "T039887", "T039886", "T039888", "T039654", ], }, release_date: "2024-12-22T23:00:00.000+00:00", title: "CVE-2024-56337", }, ], }
suse-su-2025:0033-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for tomcat10", title: "Title of the patch", }, { category: "description", text: "This update for tomcat10 fixes the following issues:\n\nUpdate to Tomcat 10.1.34\n\n- Fixed CVEs:\n + CVE-2024-54677: DoS in examples web application (bsc#1234664)\n + CVE-2024-50379: RCE due to TOCTOU issue in JSP compilation (bsc#1234663) \n + CVE-2024-52317: Request/response mix-up with HTTP/2 (bsc#1233435)\n + CVE-2024-56337: RCE due to TOCTOU issue in JSP compilation - mitigation was incomplete\n- Catalina\n + Add: Add option to serve resources from subpath only with WebDAV Servlet\n like with DefaultServlet. (michaelo)\n + Fix: Add special handling for the protocols attribute of SSLHostConfig in\n storeconfig. (remm)\n + Fix: 69442: Fix case sensitive check on content-type when parsing request\n parameters. (remm)\n + Code: Refactor duplicate code for extracting media type and subtype from\n content-type into a single method. (markt)\n + Fix: Compatibility of generated embedded code with components where\n constructors or property related methods throw a checked exception. (remm)\n + Fix: The previous fix for inconsistent resource metadata during concurrent\n reads and writes was incomplete. (markt)\n + Fix: #780: Fix content-range header length. Submitted by Chenjp. (remm)\n + Fix: 69444: Ensure that the jakarta.servlet.error.message request\n attribute is set when an application defined error page is called. (markt)\n + Fix: Avoid quotes for numeric values in the JSON generated by the status\n servlet. (remm)\n + Add: Add strong ETag support for the WebDAV and default servlet, which can\n be enabled by using the useStrongETags init parameter with a value set to\n true. The ETag generated will be a SHA-1 checksum of the resource content.\n (remm)\n + Fix: Use client locale for directory listings. (remm)\n + Fix: 69439: Improve the handling of multiple Cache-Control headers in the\n ExpiresFilter. Based on pull request #777 by Chenjp. (markt)\n + Fix: 69447: Update the support for caching classes the web application\n class loader cannot find to take account of classes loaded from external\n repositories. Prior to this fix, these classes could be incorrectly marked\n as not found. (markt)\n + Fix: 69466: Rework handling of HEAD requests. Headers explicitly set by\n users will not be removed and any header present in a HEAD request will\n also be present in the equivalent GET request. There may be some headers,\n as per RFC 9110, section 9.3.2, that are present in a GET request that are\n not present in the equivalent HEAD request. (markt)\n + Fix: 69471: Log instances of CloseNowException caught by\n ApplicationDispatcher.invoke() at debug level rather than error level as\n they are very likely to have been caused by a client disconnection or\n similar I/O issue. (markt)\n + Add: Add a test case for the fix for 69442. Also refactor references to\n application/x-www-form-urlencoded. Based on pull request #779 by Chenjp.\n (markt)\n + Fix: 69476: Catch possible ISE when trying to report PUT failure in the\n DefaultServlet. (remm)\n + Add: Add support for RateLimit header fields for HTTP (draft) in the\n RateLimitFilter. Based on pull request #775 provided by Chenjp. (markt)\n + Add: #787: Add regression tests for 69478. Pull request provided by Thomas\n Krisch. (markt)\n + Fix: The default servlet now rejects HTTP range requests when two or more\n of the requested ranges overlap. Based on pull request #782 provided by\n Chenjp. (markt)\n + Fix: Enhance Content-Range verification for partial PUT requests handled\n by the default servlet. Provided by Chenjp in pull request #778. (markt)\n + Fix: Harmonize DataSourceStore lookup in the global resources to\n optionally avoid the comp/env prefix which is usually not used there.\n (remm)\n + Fix: As required by RFC 9110, the HTTP Range header will now only be\n processed for GET requests. Based on pull request #790 provided by Chenjp.\n (markt)\n + Fix: Deprecate the useAcceptRanges initialisation parameter for the\n default servlet. It will be removed in Tomcat 12 onwards where it will\n effectively be hard coded to true. (markt)\n + Add: Add DataSource based property storage for the WebdavServlet. (remm)\n- Coyote\n + Fix: Align encodedSolidusHandling with the Servlet specification. If the\n pass-through mode is used, any %25 sequences will now also be passed\n through to avoid errors and/or corruption when the application decodes the\n path. (markt)\n- Jasper\n + Fix: Follow-up to the fix for 69381. Apply the optimisation for method\n lookup performance in expression language to an additional location.\n (markt)\n- Web applications\n + Fix: Documentation. Remove references to the ResourceParams element.\n Support for ResourceParams was removed in Tomcat 5.5.x. (markt)\n + Fix: Documentation. 69477: Correct name of attribute for RemoteIPFilter.\n The attribute is internalProxies rather than allowedInternalProxies. Pull\n request #786 (markt)\n + Fix: Examples. Fix broken links when Servlet Request Info example is\n called via a URL that includes a pathInfo component. (markt)\n + Fix: Examples. Expand the obfuscation of session cookie values in the\n request header example to JSON responses. (markt)\n + Add: Examples. Add the ability to delete session attributes in the servlet\n session example. (markt)\n + Add: Examples. Add a hard coded limit of 10 attributes per session for the\n servlet session example. (markt)\n + Add: Examples. Add the ability to delete session attributes and add a hard\n coded limit of 10 attributes per session for the JSP form authentication\n example. (markt)\n + Add: Examples. Limit the shopping cart example to only allow adding the\n pre-defined items to the cart. (markt)\n + Fix: Examples. Remove JSP calendar example. (markt)\n- Other\n + Fix: 69465: Fix warnings during native image compilation using the Tomcat\n embedded JARs. (markt)\n + Update: Update Tomcat's fork of Commons DBCP to 2.13.0. (markt)\n + Update: Update EasyMock to 5.5.0. (markt)\n + Update: Update Checkstyle to 10.20.2. (markt)\n + Update: Update BND to 7.1.0. (markt)\n + Add: Improvements to French translations. (remm)\n + Add: Improvements to Korean translations. (markt)\n + Add: Improvements to Chinese translations. (markt)\n + Add: Improvements to Japanese translations by tak7iji. (markt) \n", title: "Description of the patch", }, { category: "details", text: "SUSE-2025-33,SUSE-SLE-Module-Web-Scripting-15-SP6-2025-33,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-33,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-33,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-33,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-33,openSUSE-SLE-15.6-2025-33", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_0033-1.json", }, { category: "self", summary: "URL for SUSE-SU-2025:0033-1", url: "https://www.suse.com/support/update/announcement/2025/suse-su-20250033-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2025:0033-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020069.html", }, { category: "self", summary: "SUSE Bug 1233435", url: "https://bugzilla.suse.com/1233435", }, { category: "self", summary: "SUSE Bug 1234663", url: "https://bugzilla.suse.com/1234663", }, { category: "self", summary: "SUSE Bug 1234664", url: "https://bugzilla.suse.com/1234664", }, { category: "self", summary: "SUSE Bug 1236809", url: "https://bugzilla.suse.com/1236809", }, { category: "self", summary: "SUSE CVE CVE-2024-50379 page", url: "https://www.suse.com/security/cve/CVE-2024-50379/", }, { category: "self", summary: "SUSE CVE CVE-2024-52317 page", url: "https://www.suse.com/security/cve/CVE-2024-52317/", }, { category: "self", summary: "SUSE CVE CVE-2024-54677 page", url: "https://www.suse.com/security/cve/CVE-2024-54677/", }, { category: "self", summary: "SUSE CVE CVE-2024-56337 page", url: "https://www.suse.com/security/cve/CVE-2024-56337/", }, ], title: "Security update for tomcat10", tracking: { current_release_date: "2025-02-05T10:33:06Z", generator: { date: "2025-02-05T10:33:06Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2025:0033-1", initial_release_date: "2025-02-05T10:33:06Z", revision_history: [ { date: "2025-02-05T10:33:06Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "tomcat10-10.1.34-150200.5.31.1.noarch", product: { name: "tomcat10-10.1.34-150200.5.31.1.noarch", product_id: "tomcat10-10.1.34-150200.5.31.1.noarch", }, }, { category: "product_version", name: "tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", product: { name: "tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", product_id: "tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", }, }, { category: "product_version", name: "tomcat10-doc-10.1.34-150200.5.31.1.noarch", product: { name: "tomcat10-doc-10.1.34-150200.5.31.1.noarch", product_id: "tomcat10-doc-10.1.34-150200.5.31.1.noarch", }, }, { category: "product_version", name: "tomcat10-docs-webapp-10.1.34-150200.5.31.1.noarch", product: { name: "tomcat10-docs-webapp-10.1.34-150200.5.31.1.noarch", product_id: "tomcat10-docs-webapp-10.1.34-150200.5.31.1.noarch", }, }, { category: "product_version", name: "tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", product: { name: "tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", product_id: "tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", }, }, { category: "product_version", name: "tomcat10-embed-10.1.34-150200.5.31.1.noarch", product: { name: "tomcat10-embed-10.1.34-150200.5.31.1.noarch", product_id: "tomcat10-embed-10.1.34-150200.5.31.1.noarch", }, }, { category: "product_version", name: "tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", product: { name: "tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", product_id: "tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", }, }, { category: "product_version", name: "tomcat10-jsvc-10.1.34-150200.5.31.1.noarch", product: { name: "tomcat10-jsvc-10.1.34-150200.5.31.1.noarch", product_id: "tomcat10-jsvc-10.1.34-150200.5.31.1.noarch", }, }, { category: "product_version", name: "tomcat10-lib-10.1.34-150200.5.31.1.noarch", product: { name: "tomcat10-lib-10.1.34-150200.5.31.1.noarch", product_id: "tomcat10-lib-10.1.34-150200.5.31.1.noarch", }, }, { category: "product_version", name: "tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", product: { name: "tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", product_id: "tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", }, }, { category: "product_version", name: "tomcat10-webapps-10.1.34-150200.5.31.1.noarch", product: { name: "tomcat10-webapps-10.1.34-150200.5.31.1.noarch", product_id: "tomcat10-webapps-10.1.34-150200.5.31.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product: { name: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-web-scripting:15:sp6", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-espos:15:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-ltss:15:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP5-LTSS", product: { name: "SUSE Linux Enterprise Server 15 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15:sp5", }, }, }, { category: "product_name", name: "openSUSE Leap 15.6", product: { name: "openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.6", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "tomcat10-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", }, { category: "default_component_of", full_product_name: { name: "tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", }, { category: "default_component_of", full_product_name: { name: "tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", }, { category: "default_component_of", full_product_name: { name: "tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", }, { category: "default_component_of", full_product_name: { name: "tomcat10-lib-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-lib-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", }, { category: "default_component_of", full_product_name: { name: "tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", }, { category: "default_component_of", full_product_name: { name: "tomcat10-webapps-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-webapps-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", }, { category: "default_component_of", full_product_name: { name: "tomcat10-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-lib-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-lib-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-webapps-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-webapps-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-lib-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-lib-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-webapps-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-webapps-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-lib-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-lib-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-webapps-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-webapps-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", }, { category: "default_component_of", full_product_name: { name: "tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", }, { category: "default_component_of", full_product_name: { name: "tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", }, { category: "default_component_of", full_product_name: { name: "tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", }, { category: "default_component_of", full_product_name: { name: "tomcat10-lib-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-lib-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", }, { category: "default_component_of", full_product_name: { name: "tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", }, { category: "default_component_of", full_product_name: { name: "tomcat10-webapps-10.1.34-150200.5.31.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-webapps-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", }, { category: "default_component_of", full_product_name: { name: "tomcat10-10.1.34-150200.5.31.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat10-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat10-doc-10.1.34-150200.5.31.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat10-doc-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-doc-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat10-docs-webapp-10.1.34-150200.5.31.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-docs-webapp-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat10-embed-10.1.34-150200.5.31.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat10-embed-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-embed-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat10-jsvc-10.1.34-150200.5.31.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat10-jsvc-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-jsvc-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat10-lib-10.1.34-150200.5.31.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-lib-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat10-webapps-10.1.34-150200.5.31.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", }, product_reference: "tomcat10-webapps-10.1.34-150200.5.31.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, ], }, vulnerabilities: [ { cve: "CVE-2024-50379", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-50379", }, ], notes: [ { category: "general", text: "Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability during JSP compilation in Apache Tomcat permits an RCE on case insensitive file systems when the default servlet is enabled for write (non-default configuration).\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.\n\nUsers are recommended to upgrade to version 11.0.2, 10.1.34 or 9.0.98, which fixes the issue.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-doc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-embed-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsvc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2024-50379", url: "https://www.suse.com/security/cve/CVE-2024-50379", }, { category: "external", summary: "SUSE Bug 1234663 for CVE-2024-50379", url: "https://bugzilla.suse.com/1234663", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-doc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-embed-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsvc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-doc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-embed-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsvc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-02-05T10:33:06Z", details: "important", }, ], title: "CVE-2024-50379", }, { cve: "CVE-2024-52317", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-52317", }, ], notes: [ { category: "general", text: "Incorrect object re-cycling and re-use vulnerability in Apache Tomcat. Incorrect recycling of the request and response used by HTTP/2 requests \ncould lead to request and/or response mix-up between users.\n\nThis issue affects Apache Tomcat: from 11.0.0-M23 through 11.0.0-M26, from 10.1.27 through 10.1.30, from 9.0.92 through 9.0.95.\n\nUsers are recommended to upgrade to version 11.0.0, 10.1.31 or 9.0.96, which fixes the issue.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-doc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-embed-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsvc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2024-52317", url: "https://www.suse.com/security/cve/CVE-2024-52317", }, { category: "external", summary: "SUSE Bug 1233435 for CVE-2024-52317", url: "https://bugzilla.suse.com/1233435", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-doc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-embed-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsvc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-doc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-embed-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsvc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-02-05T10:33:06Z", details: "moderate", }, ], title: "CVE-2024-52317", }, { cve: "CVE-2024-54677", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-54677", }, ], notes: [ { category: "general", text: "Uncontrolled Resource Consumption vulnerability in the examples web application provided with Apache Tomcat leads to denial of service.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.9.97.\n\nUsers are recommended to upgrade to version 11.0.2, 10.1.34 or 9.0.98, which fixes the issue.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-doc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-embed-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsvc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2024-54677", url: "https://www.suse.com/security/cve/CVE-2024-54677", }, { category: "external", summary: "SUSE Bug 1234664 for CVE-2024-54677", url: "https://bugzilla.suse.com/1234664", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-doc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-embed-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsvc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-doc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-embed-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsvc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-02-05T10:33:06Z", details: "important", }, ], title: "CVE-2024-54677", }, { cve: "CVE-2024-56337", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-56337", }, ], notes: [ { category: "general", text: "Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache Tomcat.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.\n\nThe mitigation for CVE-2024-50379 was incomplete.\n\nUsers running Tomcat on a case insensitive file system with the default servlet write enabled (readonly initialisation \nparameter set to the non-default value of false) may need additional configuration to fully mitigate CVE-2024-50379 depending on which version of Java they are using with Tomcat:\n- running on Java 8 or Java 11: the system property sun.io.useCanonCaches must be explicitly set to false (it defaults to true)\n- running on Java 17: the system property sun.io.useCanonCaches, if set, must be set to false (it defaults to false)\n- running on Java 21 onwards: no further configuration is required (the system property and the problematic cache have been removed)\n\nTomcat 11.0.3, 10.1.35 and 9.0.99 onwards will include checks that sun.io.useCanonCaches is set appropriately before allowing the default servlet to be write enabled on a case insensitive file system. Tomcat will also set sun.io.useCanonCaches to false by default where it can.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-doc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-embed-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsvc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2024-56337", url: "https://www.suse.com/security/cve/CVE-2024-56337", }, { category: "external", summary: "SUSE Bug 1234663 for CVE-2024-56337", url: "https://bugzilla.suse.com/1234663", }, { category: "external", summary: "SUSE Bug 1236809 for CVE-2024-56337", url: "https://bugzilla.suse.com/1236809", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-doc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-embed-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsvc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-doc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-embed-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-jsvc-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-lib-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1.noarch", "openSUSE Leap 15.6:tomcat10-webapps-10.1.34-150200.5.31.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-02-05T10:33:06Z", details: "important", }, ], title: "CVE-2024-56337", }, ], }
suse-su-2025:0058-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for tomcat", title: "Title of the patch", }, { category: "description", text: "This update for tomcat fixes the following issues:\n\nUpdate to Tomcat 9.0.98\n\n- Fixed CVEs:\n + CVE-2024-54677: DoS in examples web application (bsc#1234664)\n + CVE-2024-50379: RCE due to TOCTOU issue in JSP compilation (bsc#1234663)\n + CVE-2024-52317: Request/response mix-up with HTTP/2 (bsc#1233435)\n- Catalina\n + Add: Add option to serve resources from subpath only with WebDAV Servlet\n like with DefaultServlet. (michaelo)\n + Fix: Add special handling for the protocols attribute of SSLHostConfig in\n storeconfig. (remm)\n + Fix: 69442: Fix case sensitive check on content-type when parsing request\n parameters. (remm)\n + Code: Refactor duplicate code for extracting media type and subtype from\n content-type into a single method. (markt)\n + Fix: Compatibility of generated embedded code with components where\n constructors or property related methods throw a checked exception. (remm)\n + Fix: The previous fix for inconsistent resource metadata during concurrent\n reads and writes was incomplete. (markt)\n + Fix: 69444: Ensure that the javax.servlet.error.message request attribute\n is set when an application defined error page is called. (markt)\n + Fix: Avoid quotes for numeric values in the JSON generated by the status\n servlet. (remm)\n + Add: Add strong ETag support for the WebDAV and default servlet, which can\n be enabled by using the useStrongETags init parameter with a value set to\n true. The ETag generated will be a SHA-1 checksum of the resource content.\n (remm)\n + Fix: Use client locale for directory listings. (remm)\n + Fix: 69439: Improve the handling of multiple Cache-Control headers in the\n ExpiresFilter. Based on pull request #777 by Chenjp. (markt)\n + Fix: 69447: Update the support for caching classes the web application\n class loader cannot find to take account of classes loaded from external\n repositories. Prior to this fix, these classes could be incorrectly marked\n as not found. (markt)\n + Fix: 69466: Rework handling of HEAD requests. Headers explicitly set by\n users will not be removed and any header present in a HEAD request will\n also be present in the equivalent GET request. There may be some headers,\n as per RFC 9110, section 9.3.2, that are present in a GET request that are\n not present in the equivalent HEAD request. (markt)\n + Fix: 69471: Log instances of CloseNowException caught by\n ApplicationDispatcher.invoke() at debug level rather than error level as\n they are very likely to have been caused by a client disconnection or\n similar I/O issue. (markt)\n + Add: Add a test case for the fix for 69442. Also refactor references to\n application/x-www-form-urlencoded. Based on pull request #779 by Chenjp.\n (markt)\n + Fix: 69476: Catch possible ISE when trying to report PUT failure in the\n DefaultServlet. (remm)\n + Add: Add support for RateLimit header fields for HTTP (draft) in the\n RateLimitFilter. Based on pull request #775 provided by Chenjp. (markt)\n + Add: #787: Add regression tests for 69478. Pull request provided by Thomas\n Krisch. (markt)\n + Fix: The default servlet now rejects HTTP range requests when two or more\n of the requested ranges overlap. Based on pull request #782 provided by\n Chenjp. (markt)\n + Fix: Enhance Content-Range verification for partial PUT requests handled\n by the default servlet. Provided by Chenjp in pull request #778. (markt)\n + Fix: Harmonize DataSourceStore lookup in the global resources to\n optionally avoid the comp/env prefix which is usually not used there.\n (remm)\n + Fix: As required by RFC 9110, the HTTP Range header will now only be\n processed for GET requests. Based on pull request #790 provided by Chenjp.\n (markt)\n + Fix: Deprecate the useAcceptRanges initialisation parameter for the\n default servlet. It will be removed in Tomcat 12 onwards where it will\n effectively be hard coded to true. (markt)\n + Add: Add DataSource based property storage for the WebdavServlet. (remm)\n- Coyote\n + Fix: Align encodedSolidusHandling with the Servlet specification. If the\n pass-through mode is used, any %25 sequences will now also be passed\n through to avoid errors and/or corruption when the application decodes the\n path. (markt)\n- Jasper\n + Fix: Further optimise EL evaluation of method parameters. Patch provided\n by Paolo B. (markt)\n + Fix: Follow-up to the fix for 69381. Apply the optimisation for method\n lookup performance in expression language to an additional location.\n (markt)\n- Web applications\n + Fix: Documentation. Remove references to the ResourceParams element.\n Support for ResourceParams was removed in Tomcat 5.5.x. (markt)\n + Fix: Documentation. 69477: Correct name of attribute for RemoteIPFilter.\n The attribute is internalProxies rather than allowedInternalProxies. Pull\n request #786 (markt)\n + Fix: Examples. Fix broken links when Servlet Request Info example is\n called via a URL that includes a pathInfo component. (markt)\n + Fix: Examples. Expand the obfuscation of session cookie values in the\n request header example to JSON responses. (markt)\n + Add: Examples. Add the ability to delete session attributes in the servlet\n session example. (markt)\n + Add: Examples. Add a hard coded limit of 10 attributes per session for the\n servlet session example. (markt)\n + Add: Examples. Add the ability to delete session attributes and add a hard\n coded limit of 10 attributes per session for the JSP form authentication\n example. (markt)\n + Add: Examples. Limit the shopping cart example to only allow adding the\n pre-defined items to the cart. (markt)\n + Fix: Examples. Remove JSP calendar example. (markt)\n- Other\n + Fix: 69465: Fix warnings during native image compilation using the Tomcat\n embedded JARs. (markt)\n + Update: Update Tomcat's fork of Commons DBCP to 2.13.0. (markt)\n + Update: Update EasyMock to 5.5.0. (markt)\n + Update: Update Checkstyle to 10.20.2. (markt)\n + Update: Update BND to 7.1.0. (markt)\n + Add: Improvements to French translations. (remm)\n + Add: Improvements to Korean translations. (markt)\n + Add: Improvements to Chinese translations. (markt)\n + Add: Improvements to Japanese translations by tak7iji. (markt)\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2025-58,SUSE-SLE-Module-Web-Scripting-15-SP6-2025-58,SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-58,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-58,SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-58,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-58,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-58,SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-58,SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-58,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-58,SUSE-SLE-Product-SLES_SAP-15-SP3-2025-58,SUSE-SLE-Product-SLES_SAP-15-SP4-2025-58,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-58,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-58,SUSE-Storage-7.1-2025-58,openSUSE-SLE-15.6-2025-58", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_0058-1.json", }, { category: "self", summary: "URL for SUSE-SU-2025:0058-1", url: "https://www.suse.com/support/update/announcement/2025/suse-su-20250058-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2025:0058-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020086.html", }, { category: "self", summary: "SUSE Bug 1233435", url: "https://bugzilla.suse.com/1233435", }, { category: "self", summary: "SUSE Bug 1234663", url: "https://bugzilla.suse.com/1234663", }, { category: "self", summary: "SUSE Bug 1234664", url: "https://bugzilla.suse.com/1234664", }, { category: "self", summary: "SUSE Bug 1236809", url: "https://bugzilla.suse.com/1236809", }, { category: "self", summary: "SUSE CVE CVE-2024-50379 page", url: "https://www.suse.com/security/cve/CVE-2024-50379/", }, { category: "self", summary: "SUSE CVE CVE-2024-52317 page", url: "https://www.suse.com/security/cve/CVE-2024-52317/", }, { category: "self", summary: "SUSE CVE CVE-2024-54677 page", url: "https://www.suse.com/security/cve/CVE-2024-54677/", }, { category: "self", summary: "SUSE CVE CVE-2024-56337 page", url: "https://www.suse.com/security/cve/CVE-2024-56337/", }, ], title: "Security update for tomcat", tracking: { current_release_date: "2025-02-05T10:34:01Z", generator: { date: "2025-02-05T10:34:01Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2025:0058-1", initial_release_date: "2025-02-05T10:34:01Z", revision_history: [ { date: "2025-02-05T10:34:01Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "tomcat-9.0.98-150200.74.1.noarch", product: { name: "tomcat-9.0.98-150200.74.1.noarch", product_id: "tomcat-9.0.98-150200.74.1.noarch", }, }, { category: "product_version", name: "tomcat-admin-webapps-9.0.98-150200.74.1.noarch", product: { name: "tomcat-admin-webapps-9.0.98-150200.74.1.noarch", product_id: "tomcat-admin-webapps-9.0.98-150200.74.1.noarch", }, }, { category: "product_version", name: "tomcat-docs-webapp-9.0.98-150200.74.1.noarch", product: { name: "tomcat-docs-webapp-9.0.98-150200.74.1.noarch", product_id: "tomcat-docs-webapp-9.0.98-150200.74.1.noarch", }, }, { category: "product_version", name: "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", product: { name: "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", product_id: "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", }, }, { category: "product_version", name: "tomcat-embed-9.0.98-150200.74.1.noarch", product: { name: "tomcat-embed-9.0.98-150200.74.1.noarch", product_id: "tomcat-embed-9.0.98-150200.74.1.noarch", }, }, { category: "product_version", name: "tomcat-javadoc-9.0.98-150200.74.1.noarch", product: { name: "tomcat-javadoc-9.0.98-150200.74.1.noarch", product_id: "tomcat-javadoc-9.0.98-150200.74.1.noarch", }, }, { category: "product_version", name: "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", product: { name: "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", product_id: "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", }, }, { category: "product_version", name: "tomcat-jsvc-9.0.98-150200.74.1.noarch", product: { name: "tomcat-jsvc-9.0.98-150200.74.1.noarch", product_id: "tomcat-jsvc-9.0.98-150200.74.1.noarch", }, }, { category: "product_version", name: "tomcat-lib-9.0.98-150200.74.1.noarch", product: { name: "tomcat-lib-9.0.98-150200.74.1.noarch", product_id: "tomcat-lib-9.0.98-150200.74.1.noarch", }, }, { category: "product_version", name: "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", product: { name: "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", product_id: "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", }, }, { category: "product_version", name: "tomcat-webapps-9.0.98-150200.74.1.noarch", product: { name: "tomcat-webapps-9.0.98-150200.74.1.noarch", product_id: "tomcat-webapps-9.0.98-150200.74.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product: { name: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-web-scripting:15:sp6", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-ltss:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-espos:15:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-ltss:15:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-espos:15:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-ltss:15:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP3-LTSS", product: { name: "SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP4-LTSS", product: { name: "SUSE Linux Enterprise Server 15 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP4-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP5-LTSS", product: { name: "SUSE Linux Enterprise Server 15 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15 SP4", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15:sp5", }, }, }, { category: "product_name", name: "SUSE Manager Server 4.3", product: { name: "SUSE Manager Server 4.3", product_id: "SUSE Manager Server 4.3", product_identification_helper: { cpe: "cpe:/o:suse:suse-manager-server:4.3", }, }, }, { category: "product_name", name: "SUSE Enterprise Storage 7.1", product: { name: "SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1", product_identification_helper: { cpe: "cpe:/o:suse:ses:7.1", }, }, }, { category: "product_name", name: "openSUSE Leap 15.6", product: { name: "openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.6", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "tomcat-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", }, { category: "default_component_of", full_product_name: { name: "tomcat-admin-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-admin-webapps-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", }, { category: "default_component_of", full_product_name: { name: "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", }, { category: "default_component_of", full_product_name: { name: "tomcat-lib-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-lib-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", }, { category: "default_component_of", full_product_name: { name: "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", }, { category: "default_component_of", full_product_name: { name: "tomcat-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-webapps-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", }, { category: "default_component_of", full_product_name: { name: "tomcat-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-admin-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-admin-webapps-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-lib-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-lib-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-webapps-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat-admin-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-admin-webapps-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat-lib-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-lib-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-webapps-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-admin-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-admin-webapps-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-lib-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-lib-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-webapps-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat-admin-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-admin-webapps-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat-lib-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-lib-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-webapps-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-admin-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-admin-webapps-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-lib-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-lib-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-webapps-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-admin-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-admin-webapps-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-lib-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-lib-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-webapps-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-admin-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-admin-webapps-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-lib-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-lib-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-webapps-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-admin-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-admin-webapps-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-lib-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-lib-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-webapps-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "tomcat-admin-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-admin-webapps-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "tomcat-lib-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-lib-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "tomcat-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-webapps-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "tomcat-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP4", }, { category: "default_component_of", full_product_name: { name: "tomcat-admin-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-admin-webapps-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP4", }, { category: "default_component_of", full_product_name: { name: "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP4", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP4", }, { category: "default_component_of", full_product_name: { name: "tomcat-lib-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-lib-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP4", }, { category: "default_component_of", full_product_name: { name: "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP4", }, { category: "default_component_of", full_product_name: { name: "tomcat-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-webapps-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP4", }, { category: "default_component_of", full_product_name: { name: "tomcat-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", }, { category: "default_component_of", full_product_name: { name: "tomcat-admin-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-admin-webapps-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", }, { category: "default_component_of", full_product_name: { name: "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", }, { category: "default_component_of", full_product_name: { name: "tomcat-lib-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-lib-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", }, { category: "default_component_of", full_product_name: { name: "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", }, { category: "default_component_of", full_product_name: { name: "tomcat-webapps-9.0.98-150200.74.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-webapps-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", }, { category: "default_component_of", full_product_name: { name: "tomcat-9.0.98-150200.74.1.noarch as component of SUSE Manager Server 4.3", product_id: "SUSE Manager Server 4.3:tomcat-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Manager Server 4.3", }, { category: "default_component_of", full_product_name: { name: "tomcat-admin-webapps-9.0.98-150200.74.1.noarch as component of SUSE Manager Server 4.3", product_id: "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-admin-webapps-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Manager Server 4.3", }, { category: "default_component_of", full_product_name: { name: "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch as component of SUSE Manager Server 4.3", product_id: "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Manager Server 4.3", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch as component of SUSE Manager Server 4.3", product_id: "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Manager Server 4.3", }, { category: "default_component_of", full_product_name: { name: "tomcat-lib-9.0.98-150200.74.1.noarch as component of SUSE Manager Server 4.3", product_id: "SUSE Manager Server 4.3:tomcat-lib-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-lib-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Manager Server 4.3", }, { category: "default_component_of", full_product_name: { name: "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch as component of SUSE Manager Server 4.3", product_id: "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Manager Server 4.3", }, { category: "default_component_of", full_product_name: { name: "tomcat-webapps-9.0.98-150200.74.1.noarch as component of SUSE Manager Server 4.3", product_id: "SUSE Manager Server 4.3:tomcat-webapps-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-webapps-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Manager Server 4.3", }, { category: "default_component_of", full_product_name: { name: "tomcat-9.0.98-150200.74.1.noarch as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:tomcat-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "tomcat-admin-webapps-9.0.98-150200.74.1.noarch as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-admin-webapps-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "tomcat-lib-9.0.98-150200.74.1.noarch as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-lib-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "tomcat-webapps-9.0.98-150200.74.1.noarch as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-webapps-9.0.98-150200.74.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "tomcat-9.0.98-150200.74.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-9.0.98-150200.74.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat-admin-webapps-9.0.98-150200.74.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-admin-webapps-9.0.98-150200.74.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat-docs-webapp-9.0.98-150200.74.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-docs-webapp-9.0.98-150200.74.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat-embed-9.0.98-150200.74.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat-embed-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-embed-9.0.98-150200.74.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat-javadoc-9.0.98-150200.74.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat-javadoc-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-javadoc-9.0.98-150200.74.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsvc-9.0.98-150200.74.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat-jsvc-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-jsvc-9.0.98-150200.74.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat-lib-9.0.98-150200.74.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat-lib-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-lib-9.0.98-150200.74.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat-webapps-9.0.98-150200.74.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat-webapps-9.0.98-150200.74.1.noarch", }, product_reference: "tomcat-webapps-9.0.98-150200.74.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, ], }, vulnerabilities: [ { cve: "CVE-2024-50379", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-50379", }, ], notes: [ { category: "general", text: "Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability during JSP compilation in Apache Tomcat permits an RCE on case insensitive file systems when the default servlet is enabled for write (non-default configuration).\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.\n\nUsers are recommended to upgrade to version 11.0.2, 10.1.34 or 9.0.98, which fixes the issue.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7.1:tomcat-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-embed-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-javadoc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsvc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-lib-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-webapps-9.0.98-150200.74.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2024-50379", url: "https://www.suse.com/security/cve/CVE-2024-50379", }, { category: "external", summary: "SUSE Bug 1234663 for CVE-2024-50379", url: "https://bugzilla.suse.com/1234663", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7.1:tomcat-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-embed-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-javadoc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsvc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-lib-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-webapps-9.0.98-150200.74.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 7.1:tomcat-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-embed-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-javadoc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsvc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-lib-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-webapps-9.0.98-150200.74.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-02-05T10:34:01Z", details: "important", }, ], title: "CVE-2024-50379", }, { cve: "CVE-2024-52317", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-52317", }, ], notes: [ { category: "general", text: "Incorrect object re-cycling and re-use vulnerability in Apache Tomcat. Incorrect recycling of the request and response used by HTTP/2 requests \ncould lead to request and/or response mix-up between users.\n\nThis issue affects Apache Tomcat: from 11.0.0-M23 through 11.0.0-M26, from 10.1.27 through 10.1.30, from 9.0.92 through 9.0.95.\n\nUsers are recommended to upgrade to version 11.0.0, 10.1.31 or 9.0.96, which fixes the issue.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7.1:tomcat-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-embed-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-javadoc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsvc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-lib-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-webapps-9.0.98-150200.74.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2024-52317", url: "https://www.suse.com/security/cve/CVE-2024-52317", }, { category: "external", summary: "SUSE Bug 1233435 for CVE-2024-52317", url: "https://bugzilla.suse.com/1233435", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7.1:tomcat-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-embed-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-javadoc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsvc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-lib-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-webapps-9.0.98-150200.74.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, products: [ "SUSE Enterprise Storage 7.1:tomcat-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-embed-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-javadoc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsvc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-lib-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-webapps-9.0.98-150200.74.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-02-05T10:34:01Z", details: "moderate", }, ], title: "CVE-2024-52317", }, { cve: "CVE-2024-54677", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-54677", }, ], notes: [ { category: "general", text: "Uncontrolled Resource Consumption vulnerability in the examples web application provided with Apache Tomcat leads to denial of service.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.9.97.\n\nUsers are recommended to upgrade to version 11.0.2, 10.1.34 or 9.0.98, which fixes the issue.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7.1:tomcat-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-embed-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-javadoc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsvc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-lib-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-webapps-9.0.98-150200.74.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2024-54677", url: "https://www.suse.com/security/cve/CVE-2024-54677", }, { category: "external", summary: "SUSE Bug 1234664 for CVE-2024-54677", url: "https://bugzilla.suse.com/1234664", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7.1:tomcat-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-embed-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-javadoc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsvc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-lib-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-webapps-9.0.98-150200.74.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 7.1:tomcat-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-embed-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-javadoc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsvc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-lib-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-webapps-9.0.98-150200.74.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-02-05T10:34:01Z", details: "important", }, ], title: "CVE-2024-54677", }, { cve: "CVE-2024-56337", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-56337", }, ], notes: [ { category: "general", text: "Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache Tomcat.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.\n\nThe mitigation for CVE-2024-50379 was incomplete.\n\nUsers running Tomcat on a case insensitive file system with the default servlet write enabled (readonly initialisation \nparameter set to the non-default value of false) may need additional configuration to fully mitigate CVE-2024-50379 depending on which version of Java they are using with Tomcat:\n- running on Java 8 or Java 11: the system property sun.io.useCanonCaches must be explicitly set to false (it defaults to true)\n- running on Java 17: the system property sun.io.useCanonCaches, if set, must be set to false (it defaults to false)\n- running on Java 21 onwards: no further configuration is required (the system property and the problematic cache have been removed)\n\nTomcat 11.0.3, 10.1.35 and 9.0.99 onwards will include checks that sun.io.useCanonCaches is set appropriately before allowing the default servlet to be write enabled on a case insensitive file system. Tomcat will also set sun.io.useCanonCaches to false by default where it can.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7.1:tomcat-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-embed-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-javadoc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsvc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-lib-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-webapps-9.0.98-150200.74.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2024-56337", url: "https://www.suse.com/security/cve/CVE-2024-56337", }, { category: "external", summary: "SUSE Bug 1234663 for CVE-2024-56337", url: "https://bugzilla.suse.com/1234663", }, { category: "external", summary: "SUSE Bug 1236809 for CVE-2024-56337", url: "https://bugzilla.suse.com/1236809", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7.1:tomcat-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-embed-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-javadoc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsvc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-lib-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-webapps-9.0.98-150200.74.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 7.1:tomcat-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-lib-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "SUSE Manager Server 4.3:tomcat-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-embed-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-javadoc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-jsvc-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-lib-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.98-150200.74.1.noarch", "openSUSE Leap 15.6:tomcat-webapps-9.0.98-150200.74.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-02-05T10:34:01Z", details: "important", }, ], title: "CVE-2024-56337", }, ], }
suse-su-2025:1126-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for tomcat", title: "Title of the patch", }, { category: "description", text: "This update for tomcat fixes the following issues:\n\n- CVE-2025-24813: Fixed potential RCE and/or information disclosure/corruption with partial PUT (bsc#1239302)\n\n- Update to Tomcat 9.0.102\n * Fixes:\n + launch with java 17 (bsc#1239676)\n * Catalina\n + Fix: Weak etags in the If-Range header should not match as strong etags\n are required. (remm)\n + Fix: When looking up class loader resources by resource name, the resource\n name should not start with '/'. If the resource name does start with '/',\n Tomcat is lenient and looks it up as if the '/' was not present. When the\n web application class loader was configured with external repositories and\n names starting with '/' were used for lookups, it was possible that cached\n 'not found' results could effectively hide lookup results using the\n correct resource name. (markt)\n + Fix: Enable the JNDIRealm to validate credentials provided to\n HttpServletRequest.login(String username, String password) when the realm\n is configured to use GSSAPI authentication. (markt)\n + Fix: Fix a bug in the JRE compatibility detection that incorrectly\n identified Java 19 and Java 20 as supporting Java 21 features. (markt)\n + Fix: Improve the checks for exposure to and protection against\n CVE-2024-56337 so that reflection is not used unless required. The checks\n for whether the file system is case sensitive or not have been removed.\n (markt)\n + Fix: Avoid scenarios where temporary files used for partial PUT would not\n be deleted. (remm)\n + Fix: 69602: Fix regression in releases from 12-2024 that were too strict\n and rejected weak etags in the If-Range header. (remm)\n + Fix: 69576: Avoid possible failure initializing JreCompat due to uncaught\n exception introduced for the check for CVE-2024-56337. (remm)\n * Cluster\n + Add: 69598: Add detection of service account token changes to the\n KubernetesMembershipProvider implementation and reload the token if it\n changes. Based on a patch by Miroslav Jezbera. (markt)\n * Coyote\n + Fix: 69575: Avoid using compression if a response is already compressed\n using compress, deflate or zstd. (remm)\n + Update: Use Transfer-Encoding for compression rather than Content-Encoding\n if the client submits a TE header containing gzip. (remm)\n + Fix: Fix a race condition in the handling of HTTP/2 stream reset that\n could cause unexpected 500 responses. (markt)\n * Other\n + Add: Add makensis as an option for building the Installer for Windows on\n non-Windows platforms. (rjung/markt)\n + Update: Update Byte Buddy to 1.17.1. (markt)\n + Update: Update Checkstyle to 10.21.3. (markt)\n + Update: Update SpotBugs to 4.9.1. (markt)\n + Update: Update JSign to 7.1. (markt)\n + Add: Improvements to French translations. (remm)\n + Add: Improvements to Japanese translations by tak7iji. (markt)\n + Add: Add org.apache.juli.JsonFormatter to format log as one line JSON\n documents. (remm) \n\n- Update to Tomcat 9.0.99\n * Catalina\n + Update: Add tableName configuration on the DataSourcePropertyStore that\n may be used by the WebDAV Servlet. (remm)\n + Update: Improve HTTP If headers processing according to RFC 9110. Based on\n pull request #796 by Chenjp. (remm/markt)\n + Update: Allow readOnly attribute configuration on the Resources element\n and allow configure the readOnly attribute value of the main resources.\n The attribute value will also be used by the default and WebDAV Servlets.\n (remm)\n + Fix: 69285: Optimise the creation of the parameter map for included\n requests. Based on sample code and test cases provided by John\n Engebretson. (markt)\n + Fix: 69527: Avoid rare cases where a cached resource could be set with 0\n content length, or could be evicted immediately. (remm)\n + Fix: Fix possible edge cases (such as HTTP/1.0) with trying to detect\n requests without body for WebDAV LOCK and PROPFIND. (remm)\n + Fix: 69528: Add multi-release JAR support for the bloom\n archiveIndexStrategy of the Resources. (remm)\n + Fix: Improve checks for WEB-INF and META-INF in the WebDAV servlet. Based\n on a patch submitted by Chenjp. (remm)\n + Add: Add a check to ensure that, if one or more web applications are\n potentially vulnerable to CVE-2024-56337, the JVM has been configured to\n protect against the vulnerability and to configure the JVM correctly if\n not. Where one or more web applications are potentially vulnerable to\n CVE-2024-56337 and the JVM cannot be correctly configured or it cannot be\n confirmed that the JVM has been correctly configured, prevent the impacted\n web applications from starting. (markt)\n + Fix: Remove unused session to client map from CrawlerSessionManagerValve.\n Submitted by Brian Matzon. (remm)\n + Fix: When using the WebDAV servlet with serveSubpathOnly set to true,\n ensure that the destination for any requested WebDAV operation is also\n restricted to the sub-path. (markt)\n + Fix: Generate an appropriate Allow HTTP header when the Default servlet\n returns a 405 (method not allowed) response in response to a DELETE\n request because the target resource cannot be deleted. Pull request #802\n provided by Chenjp. (markt)\n + Code: Refactor creation of RequestDispatcher instances so that the\n processing of the provided path is consistent with normal request\n processing. (markt)\n + Add: Add encodedReverseSolidusHandling and encodedSolidusHandling\n attributes to Context to provide control over the handling of the path\n used to created a RequestDispatcher. (markt)\n + Fix: Handle a potential NullPointerException after an IOException occurs\n on a non-container thread during asynchronous processing. (markt)\n + Fix: Enhance lifecycle of temporary files used by partial PUT. (remm)\n * Coyote\n + Fix: Don't log warnings for registered HTTP/2 settings that Tomcat does\n not support. These settings are now silently ignored. (markt)\n + Fix: Avoid a rare NullPointerException when recycling the\n Http11InputBuffer. (markt)\n + Fix: Lower the log level to debug for logging an invalid socket channel\n when processing poller events for the NIO Connector as this may occur in\n normal usage. (markt)\n + Code: Clean-up references to the HTTP/2 stream once request processing has\n completed to aid GC and reduce the size of the HTTP/2 recycled request and\n response cache. (markt)\n + Add: Add a new Connector configuration attribute,\n encodedReverseSolidusHandling, to control how %5c sequences in URLs are\n handled. The default behaviour is unchanged (decode) keeping in mind that\n the allowBackslash attribute determines how the decoded URI is processed.\n (markt)\n + Fix: 69545: Improve CRLF skipping for the available method of the\n ChunkedInputFilter. (remm)\n + Fix: Improve the performance of repeated calls to getHeader(). Pull\n request #813 provided by Adwait Kumar Singh. (markt)\n + Fix: 69559: Ensure that the Java 24 warning regarding the use of\n sun.misc.Unsafe::invokeCleaner is only reported by the JRE when the code\n will be used. (markt)\n * Jasper\n + Fix: 69508: Correct a regression in the fix for 69382 that broke JSP\n include actions if both the page attribute and the body contained\n parameters. Pull request #803 provided by Chenjp. (markt)\n + Fix: 69521: Update the EL Parser to allow the full range of valid\n characters in an EL identifier as defined by the Java Language\n Specification. (markt)\n + Fix: 69532: Optimise the creation of ExpressionFactory instances. Patch\n provided by John Engebretson. (markt)\n * Web applications\n + Add: Documentation. Expand the description of the security implications of\n setting mapperContextRootRedirectEnabled and/or\n mapperDirectoryRedirectEnabled to true. (markt)\n + Fix: Documentation. Better document the default for the truststoreProvider\n attribute of a SSLHostConfig element. (markt)\n * Other\n + Update: Update to Commons Daemon 1.4.1. (markt)\n + Update: Update the internal fork of Commons Pool to 2.12.1. (markt)\n + Update: Update Byte Buddy to 1.16.1. (markt)\n + Update: Update UnboundID to 7.0.2. (markt)\n + Update: Update Checkstyle to 10.21.2. (markt)\n + Update: Update SpotBugs to 4.9.0. (markt)\n + Add: Improvements to French translations. (remm)\n + Add: Improvements to Chinese translations by leeyazhou. (markt)\n + Add: Improvements to Japanese translations by tak7iji. (markt)\n ", title: "Description of the patch", }, { category: "details", text: "SUSE-2025-1126,SUSE-SLE-Module-Web-Scripting-15-SP6-2025-1126,SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1126,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1126,SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1126,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1126,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1126,SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1126,SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1126,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1126,SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1126,SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1126,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1126,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1126,SUSE-Storage-7.1-2025-1126,openSUSE-SLE-15.6-2025-1126", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_1126-1.json", }, { category: "self", summary: "URL for SUSE-SU-2025:1126-1", url: "https://www.suse.com/support/update/announcement/2025/suse-su-20251126-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2025:1126-1", url: "https://lists.suse.com/pipermail/sle-updates/2025-April/038899.html", }, { category: "self", summary: "SUSE Bug 1239302", url: "https://bugzilla.suse.com/1239302", }, { category: "self", summary: "SUSE Bug 1239676", url: "https://bugzilla.suse.com/1239676", }, { category: "self", summary: "SUSE CVE CVE-2024-56337 page", url: "https://www.suse.com/security/cve/CVE-2024-56337/", }, { category: "self", summary: "SUSE CVE CVE-2025-24813 page", url: "https://www.suse.com/security/cve/CVE-2025-24813/", }, ], title: "Security update for tomcat", tracking: { current_release_date: "2025-04-03T11:51:06Z", generator: { date: "2025-04-03T11:51:06Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2025:1126-1", initial_release_date: "2025-04-03T11:51:06Z", revision_history: [ { date: "2025-04-03T11:51:06Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "tomcat-9.0.102-150200.78.1.noarch", product: { name: "tomcat-9.0.102-150200.78.1.noarch", product_id: "tomcat-9.0.102-150200.78.1.noarch", }, }, { category: "product_version", name: "tomcat-admin-webapps-9.0.102-150200.78.1.noarch", product: { name: "tomcat-admin-webapps-9.0.102-150200.78.1.noarch", product_id: "tomcat-admin-webapps-9.0.102-150200.78.1.noarch", }, }, { category: "product_version", name: "tomcat-docs-webapp-9.0.102-150200.78.1.noarch", product: { name: "tomcat-docs-webapp-9.0.102-150200.78.1.noarch", product_id: "tomcat-docs-webapp-9.0.102-150200.78.1.noarch", }, }, { category: "product_version", name: "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", product: { name: "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", product_id: "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", }, }, { category: "product_version", name: "tomcat-embed-9.0.102-150200.78.1.noarch", product: { name: "tomcat-embed-9.0.102-150200.78.1.noarch", product_id: "tomcat-embed-9.0.102-150200.78.1.noarch", }, }, { category: "product_version", name: "tomcat-javadoc-9.0.102-150200.78.1.noarch", product: { name: "tomcat-javadoc-9.0.102-150200.78.1.noarch", product_id: "tomcat-javadoc-9.0.102-150200.78.1.noarch", }, }, { category: "product_version", name: "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", product: { name: "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", product_id: "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", }, }, { category: "product_version", name: "tomcat-jsvc-9.0.102-150200.78.1.noarch", product: { name: "tomcat-jsvc-9.0.102-150200.78.1.noarch", product_id: "tomcat-jsvc-9.0.102-150200.78.1.noarch", }, }, { category: "product_version", name: "tomcat-lib-9.0.102-150200.78.1.noarch", product: { name: "tomcat-lib-9.0.102-150200.78.1.noarch", product_id: "tomcat-lib-9.0.102-150200.78.1.noarch", }, }, { category: "product_version", name: "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", product: { name: "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", product_id: "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", }, }, { category: "product_version", name: "tomcat-webapps-9.0.102-150200.78.1.noarch", product: { name: "tomcat-webapps-9.0.102-150200.78.1.noarch", product_id: "tomcat-webapps-9.0.102-150200.78.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product: { name: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-web-scripting:15:sp6", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-ltss:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-espos:15:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-ltss:15:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-espos:15:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-ltss:15:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP3-LTSS", product: { name: "SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP4-LTSS", product: { name: "SUSE Linux Enterprise Server 15 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP4-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP5-LTSS", product: { name: "SUSE Linux Enterprise Server 15 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15 SP4", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15:sp5", }, }, }, { category: "product_name", name: "SUSE Manager Server 4.3", product: { name: "SUSE Manager Server 4.3", product_id: "SUSE Manager Server 4.3", product_identification_helper: { cpe: "cpe:/o:suse:suse-manager-server:4.3", }, }, }, { category: "product_name", name: "SUSE Enterprise Storage 7.1", product: { name: "SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1", product_identification_helper: { cpe: "cpe:/o:suse:ses:7.1", }, }, }, { category: "product_name", name: "openSUSE Leap 15.6", product: { name: "openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.6", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "tomcat-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", }, { category: "default_component_of", full_product_name: { name: "tomcat-admin-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-admin-webapps-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", }, { category: "default_component_of", full_product_name: { name: "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", }, { category: "default_component_of", full_product_name: { name: "tomcat-lib-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-lib-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", }, { category: "default_component_of", full_product_name: { name: "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", }, { category: "default_component_of", full_product_name: { name: "tomcat-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-webapps-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", }, { category: "default_component_of", full_product_name: { name: "tomcat-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-admin-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-admin-webapps-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-lib-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-lib-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-webapps-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat-admin-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-admin-webapps-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat-lib-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-lib-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-webapps-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-admin-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-admin-webapps-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-lib-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-lib-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-webapps-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat-admin-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-admin-webapps-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat-lib-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-lib-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-webapps-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-admin-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-admin-webapps-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-lib-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-lib-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-webapps-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-admin-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-admin-webapps-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-lib-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-lib-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-webapps-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-admin-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-admin-webapps-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-lib-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-lib-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-webapps-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-admin-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-admin-webapps-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-lib-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-lib-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-webapps-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "tomcat-admin-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-admin-webapps-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "tomcat-lib-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-lib-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "tomcat-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-webapps-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "tomcat-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP4", }, { category: "default_component_of", full_product_name: { name: "tomcat-admin-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-admin-webapps-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP4", }, { category: "default_component_of", full_product_name: { name: "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP4", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP4", }, { category: "default_component_of", full_product_name: { name: "tomcat-lib-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-lib-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP4", }, { category: "default_component_of", full_product_name: { name: "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP4", }, { category: "default_component_of", full_product_name: { name: "tomcat-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-webapps-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP4", }, { category: "default_component_of", full_product_name: { name: "tomcat-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", }, { category: "default_component_of", full_product_name: { name: "tomcat-admin-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-admin-webapps-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", }, { category: "default_component_of", full_product_name: { name: "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", }, { category: "default_component_of", full_product_name: { name: "tomcat-lib-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-lib-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", }, { category: "default_component_of", full_product_name: { name: "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", }, { category: "default_component_of", full_product_name: { name: "tomcat-webapps-9.0.102-150200.78.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-webapps-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", }, { category: "default_component_of", full_product_name: { name: "tomcat-9.0.102-150200.78.1.noarch as component of SUSE Manager Server 4.3", product_id: "SUSE Manager Server 4.3:tomcat-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Manager Server 4.3", }, { category: "default_component_of", full_product_name: { name: "tomcat-admin-webapps-9.0.102-150200.78.1.noarch as component of SUSE Manager Server 4.3", product_id: "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-admin-webapps-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Manager Server 4.3", }, { category: "default_component_of", full_product_name: { name: "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch as component of SUSE Manager Server 4.3", product_id: "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Manager Server 4.3", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch as component of SUSE Manager Server 4.3", product_id: "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Manager Server 4.3", }, { category: "default_component_of", full_product_name: { name: "tomcat-lib-9.0.102-150200.78.1.noarch as component of SUSE Manager Server 4.3", product_id: "SUSE Manager Server 4.3:tomcat-lib-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-lib-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Manager Server 4.3", }, { category: "default_component_of", full_product_name: { name: "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch as component of SUSE Manager Server 4.3", product_id: "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Manager Server 4.3", }, { category: "default_component_of", full_product_name: { name: "tomcat-webapps-9.0.102-150200.78.1.noarch as component of SUSE Manager Server 4.3", product_id: "SUSE Manager Server 4.3:tomcat-webapps-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-webapps-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Manager Server 4.3", }, { category: "default_component_of", full_product_name: { name: "tomcat-9.0.102-150200.78.1.noarch as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:tomcat-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "tomcat-admin-webapps-9.0.102-150200.78.1.noarch as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-admin-webapps-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "tomcat-lib-9.0.102-150200.78.1.noarch as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-lib-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "tomcat-webapps-9.0.102-150200.78.1.noarch as component of SUSE Enterprise Storage 7.1", product_id: "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-webapps-9.0.102-150200.78.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 7.1", }, { category: "default_component_of", full_product_name: { name: "tomcat-9.0.102-150200.78.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-9.0.102-150200.78.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat-admin-webapps-9.0.102-150200.78.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-admin-webapps-9.0.102-150200.78.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat-docs-webapp-9.0.102-150200.78.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-docs-webapp-9.0.102-150200.78.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat-embed-9.0.102-150200.78.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat-embed-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-embed-9.0.102-150200.78.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat-javadoc-9.0.102-150200.78.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat-javadoc-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-javadoc-9.0.102-150200.78.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat-jsvc-9.0.102-150200.78.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat-jsvc-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-jsvc-9.0.102-150200.78.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat-lib-9.0.102-150200.78.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat-lib-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-lib-9.0.102-150200.78.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat-webapps-9.0.102-150200.78.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat-webapps-9.0.102-150200.78.1.noarch", }, product_reference: "tomcat-webapps-9.0.102-150200.78.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, ], }, vulnerabilities: [ { cve: "CVE-2024-56337", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-56337", }, ], notes: [ { category: "general", text: "Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache Tomcat.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.\n\nThe mitigation for CVE-2024-50379 was incomplete.\n\nUsers running Tomcat on a case insensitive file system with the default servlet write enabled (readonly initialisation \nparameter set to the non-default value of false) may need additional configuration to fully mitigate CVE-2024-50379 depending on which version of Java they are using with Tomcat:\n- running on Java 8 or Java 11: the system property sun.io.useCanonCaches must be explicitly set to false (it defaults to true)\n- running on Java 17: the system property sun.io.useCanonCaches, if set, must be set to false (it defaults to false)\n- running on Java 21 onwards: no further configuration is required (the system property and the problematic cache have been removed)\n\nTomcat 11.0.3, 10.1.35 and 9.0.99 onwards will include checks that sun.io.useCanonCaches is set appropriately before allowing the default servlet to be write enabled on a case insensitive file system. Tomcat will also set sun.io.useCanonCaches to false by default where it can.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7.1:tomcat-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-webapps-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-embed-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-javadoc-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-jsvc-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-lib-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-webapps-9.0.102-150200.78.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2024-56337", url: "https://www.suse.com/security/cve/CVE-2024-56337", }, { category: "external", summary: "SUSE Bug 1234663 for CVE-2024-56337", url: "https://bugzilla.suse.com/1234663", }, { category: "external", summary: "SUSE Bug 1236809 for CVE-2024-56337", url: "https://bugzilla.suse.com/1236809", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7.1:tomcat-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-webapps-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-embed-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-javadoc-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-jsvc-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-lib-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-webapps-9.0.102-150200.78.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 7.1:tomcat-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-webapps-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-embed-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-javadoc-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-jsvc-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-lib-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-webapps-9.0.102-150200.78.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-04-03T11:51:06Z", details: "important", }, ], title: "CVE-2024-56337", }, { cve: "CVE-2025-24813", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2025-24813", }, ], notes: [ { category: "general", text: "Path Equivalence: 'file.Name' (Internal Dot) leading to Remote Code Execution and/or Information disclosure and/or malicious content added to uploaded files via write enabled Default Servlet in Apache Tomcat.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98.\n\nIf all of the following were true, a malicious user was able to view security sensitive files and/or inject content into those files:\n- writes enabled for the default servlet (disabled by default)\n- support for partial PUT (enabled by default)\n- a target URL for security sensitive uploads that was a sub-directory of a target URL for public uploads\n- attacker knowledge of the names of security sensitive files being uploaded\n- the security sensitive files also being uploaded via partial PUT\n\nIf all of the following were true, a malicious user was able to perform remote code execution:\n- writes enabled for the default servlet (disabled by default)\n- support for partial PUT (enabled by default)\n- application was using Tomcat's file based session persistence with the default storage location\n- application included a library that may be leveraged in a deserialization attack\n\nUsers are recommended to upgrade to version 11.0.3, 10.1.35 or 9.0.99, which fixes the issue.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 7.1:tomcat-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-webapps-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-embed-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-javadoc-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-jsvc-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-lib-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-webapps-9.0.102-150200.78.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2025-24813", url: "https://www.suse.com/security/cve/CVE-2025-24813", }, { category: "external", summary: "SUSE Bug 1239302 for CVE-2025-24813", url: "https://bugzilla.suse.com/1239302", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 7.1:tomcat-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-webapps-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-embed-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-javadoc-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-jsvc-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-lib-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-webapps-9.0.102-150200.78.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Enterprise Storage 7.1:tomcat-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Enterprise Storage 7.1:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat-webapps-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-lib-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "SUSE Manager Server 4.3:tomcat-webapps-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-admin-webapps-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-docs-webapp-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-el-3_0-api-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-embed-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-javadoc-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-jsp-2_3-api-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-jsvc-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-lib-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-servlet-4_0-api-9.0.102-150200.78.1.noarch", "openSUSE Leap 15.6:tomcat-webapps-9.0.102-150200.78.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-04-03T11:51:06Z", details: "important", }, ], title: "CVE-2025-24813", }, ], }
suse-su-2025:1024-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for tomcat10", title: "Title of the patch", }, { category: "description", text: "This update for tomcat10 fixes the following issues:\n\n- CVE-2025-24813: Fixed potential RCE and/or information disclosure/corruption with\n partial PUT (bsc#1239302)\n\nOther fixes:\n\n- Update to Tomcat 10.1.39\n * Fixes:\n + launch with java 17 (bsc#1239676)\n * Catalina\n + Fix: 69602: Fix regression in releases from 12-2024 that were too strict\n and rejected weak etags in the If-Range header with a 400 response.\n Instead will consider it as a failed match since strong etags are required\n for If-Range. (remm)\n + Fix: When looking up class loader resources by resource name, the resource\n name should not start with '/'. If the resource name does start with '/',\n Tomcat is lenient and looks it up as if the '/' was not present. When the\n web application class loader was configured with external repositories and\n names starting with '/' were used for lookups, it was possible that cached\n 'not found' results could effectively hide lookup results using the\n correct resource name. (markt)\n + Fix: Enable the JNDIRealm to validate credentials provided to\n HttpServletRequest.login(String username, String password) when the realm\n is configured to use GSSAPI authentication. (markt)\n + Fix: Fix a bug in the JRE compatibility detection that incorrectly\n identified Java 19 and Java 20 as supporting Java 21 features. (markt)\n + Fix: Improve the checks for exposure to and protection against\n CVE-2024-56337 so that reflection is not used unless required. The checks\n for whether the file system is case sensitive or not have been removed.\n (markt)\n + Add: Add support for logging the connection ID (as returned by\n ServletRequest.getServletConnection().getConnectionId()) with the\n AccessLogValve and ExtendedAccessLogValve. Based on pull request #814 by\n Dmole. (markt)\n + Fix: Avoid scenarios where temporary files used for partial PUT would not\n be deleted. (remm)\n + Fix: 69576: Avoid possible failure initializing JreCompat due to uncaught\n exception introduced for the check for CVE-2024-56337. (remm)\n * Cluster\n + Add: 69598: Add detection of service account token changes to the\n KubernetesMembershipProvider implementation and reload the token if it\n changes. Based on a patch by Miroslav Jezbera. (markt)\n * Coyote\n + Fix: 69575: Avoid using compression if a response is already compressed\n using compress, deflate or zstd. (remm)\n + Update: Use Transfer-Encoding for compression rather than Content-Encoding\n if the client submits a TE header containing gzip. (remm)\n + Fix: Fix a race condition in the handling of HTTP/2 stream reset that\n could cause unexpected 500 responses. (markt)\n * Other\n + Add: Add makensis as an option for building the Installer for Windows on\n non-Windows platforms. (rjung/markt)\n + Update: Update Byte Buddy to 1.17.1. (markt)\n + Update: Update Checkstyle to 10.21.3. (markt)\n + Update: Update SpotBugs to 4.9.1. (markt)\n + Update: Update JSign to 7.1. (markt)\n + Add: Improvements to French translations. (remm)\n + Add: Improvements to Japanese translations by tak7iji. (markt)\n + Add: Add org.apache.juli.JsonFormatter to format log as one line JSON\n documents. (remm) \n\n- Update to Tomcat 10.1.35\n * Catalina\n + Update: Add tableName configuration on the DataSourcePropertyStore that\n may be used by the WebDAV Servlet. (remm)\n + Update: Improve HTTP If headers processing according to RFC 9110. Based on\n pull request #796 by Chenjp. (remm/markt)\n + Update: Allow readOnly attribute configuration on the Resources element\n and allow configure the readOnly attribute value of the main resources.\n The attribute value will also be used by the default and WebDAV Servlets.\n (remm)\n + Fix: 69285: Optimise the creation of the parameter map for included\n requests. Based on sample code and test cases provided by John\n Engebretson. (markt)\n + Fix: 69527: Avoid rare cases where a cached resource could be set with 0\n content length, or could be evicted immediately. (remm)\n + Fix: Fix possible edge cases (such as HTTP/1.0) with trying to detect\n requests without body for WebDAV LOCK and PROPFIND. (remm)\n + Fix: 69528: Add multi-release JAR support for the bloom\n archiveIndexStrategy of the Resources. (remm)\n + Fix: Improve checks for WEB-INF and META-INF in the WebDAV servlet. Based\n on a patch submitted by Chenjp. (remm)\n + Fix: Remove unused session to client map from CrawlerSessionManagerValve.\n Submitted by Brian Matzon. (remm)\n + Add: Add a check to ensure that, if one or more web applications are\n potentially vulnerable to CVE-2024-56337, the JVM has been configured to\n protect against the vulnerability and to configure the JVM correctly if\n not. Where one or more web applications are potentially vulnerable to\n CVE-2024-56337 and the JVM cannot be correctly configured or it cannot be\n confirmed that the JVM has been correctly configured, prevent the impacted\n web applications from starting. (markt)\n + Fix: When using the WebDAV servlet with serveSubpathOnly set to true,\n ensure that the destination for any requested WebDAV operation is also\n restricted to the sub-path. (markt)\n + Fix: Generate an appropriate Allow HTTP header when the Default servlet\n returns a 405 (method not allowed) response in response to a DELETE\n request because the target resource cannot be deleted. Pull request #802\n provided by Chenjp. (markt)\n + Code: Refactor creation of RequestDispatcher instances so that the\n processing of the provided path is consistent with normal request\n processing. (markt)\n + Add: Add encodedReverseSolidusHandling and encodedSolidusHandling\n attributes to Context to provide control over the handling of the path\n used to created a RequestDispatcher. (markt)\n + Fix: Handle a potential NullPointerException after an IOException occurs\n on a non-container thread during asynchronous processing. (markt)\n + Fix: Enhance lifecycle of temporary files used by partial PUT. (remm)\n * Coyote\n + Fix: Don't log warnings for registered HTTP/2 settings that Tomcat does\n not support. These settings are now silently ignored. (markt)\n + Fix: Avoid a rare NullPointerException when recycling the\n Http11InputBuffer. (markt)\n + Fix: Lower the log level to debug for logging an invalid socket channel\n when processing poller events for the NIO Connector as this may occur in\n normal usage. (markt)\n + Code: Clean-up references to the HTTP/2 stream once request processing has\n completed to aid GC and reduce the size of the HTTP/2 recycled request and\n response cache. (markt)\n + Add: Add a new Connector configuration attribute,\n encodedReverseSolidusHandling, to control how %5c sequences in URLs are\n handled. The default behaviour is unchanged (decode) keeping in mind that\n the allowBackslash attribute determines how the decoded URI is processed.\n (markt)\n + Fix: 69545: Improve CRLF skipping for the available method of the\n ChunkedInputFilter. (remm)\n + Fix: Improve the performance of repeated calls to getHeader(). Pull\n request #813 provided by Adwait Kumar Singh. (markt)\n + Fix: 69559: Ensure that the Java 24 warning regarding the use of\n sun.misc.Unsafe::invokeCleaner is only reported by the JRE when the code\n will be used. (markt)\n * Jasper\n + Fix: 69508: Correct a regression in the fix for 69382 that broke JSP\n include actions if both the page attribute and the body contained\n parameters. Pull request #803 provided by Chenjp. (markt)\n + Fix: Update the identifier validation in the Expression Language parser to\n reflect that, as of Java 9, _ is also a Java keyword and may not be used\n as an identifier. (markt)\n + Fix: 69521: Update the EL Parser to allow the full range of valid\n characters in an EL identifier as defined by the Java Language\n Specification. (markt)\n + Fix: 69532: Optimise the creation of ExpressionFactory instances. Patch\n provided by John Engebretson. (markt)\n * Web applications\n + Add: Documentation. Expand the description of the security implications of\n setting mapperContextRootRedirectEnabled and/or\n mapperDirectoryRedirectEnabled to true. (markt)\n + Fix: Documentation. Better document the default for the truststoreProvider\n attribute of a SSLHostConfig element. (markt)\n * Other\n + Update: Update to Commons Daemon 1.4.1. (markt)\n + Update: Update the packaged version of the Tomcat Migration Tool for\n Jakarta EE to 1.0.9. (markt)\n + Update: Update the internal fork of Commons Pool to 2.12.1. (markt)\n + Update: Update Byte Buddy to 1.16.1. (markt)\n + Update: Update UnboundID to 7.0.2. (markt)\n + Update: Update Checkstyle to 10.21.2. (markt)\n + Update: Update SpotBugs to 4.9.0. (markt)\n + Add: Improvements to French translations. (remm)\n + Add: Improvements to Chinese translations by leeyazhou. (markt)\n + Add: Improvements to Japanese translations by tak7iji. (markt) \n + Add: Improvements to Japanese translations by tak7iji. (markt)", title: "Description of the patch", }, { category: "details", text: "SUSE-2025-1024,SUSE-SLE-Module-Web-Scripting-15-SP6-2025-1024,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1024,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1024,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1024,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1024,openSUSE-SLE-15.6-2025-1024", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_1024-1.json", }, { category: "self", summary: "URL for SUSE-SU-2025:1024-1", url: "https://www.suse.com/support/update/announcement/2025/suse-su-20251024-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2025:1024-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020602.html", }, { category: "self", summary: "SUSE Bug 1239302", url: "https://bugzilla.suse.com/1239302", }, { category: "self", summary: "SUSE Bug 1239676", url: "https://bugzilla.suse.com/1239676", }, { category: "self", summary: "SUSE CVE CVE-2024-56337 page", url: "https://www.suse.com/security/cve/CVE-2024-56337/", }, { category: "self", summary: "SUSE CVE CVE-2025-24813 page", url: "https://www.suse.com/security/cve/CVE-2025-24813/", }, ], title: "Security update for tomcat10", tracking: { current_release_date: "2025-03-26T11:29:12Z", generator: { date: "2025-03-26T11:29:12Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2025:1024-1", initial_release_date: "2025-03-26T11:29:12Z", revision_history: [ { date: "2025-03-26T11:29:12Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "tomcat10-10.1.39-150200.5.36.1.noarch", product: { name: "tomcat10-10.1.39-150200.5.36.1.noarch", product_id: "tomcat10-10.1.39-150200.5.36.1.noarch", }, }, { category: "product_version", name: "tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", product: { name: "tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", product_id: "tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", }, }, { category: "product_version", name: "tomcat10-doc-10.1.39-150200.5.36.1.noarch", product: { name: "tomcat10-doc-10.1.39-150200.5.36.1.noarch", product_id: "tomcat10-doc-10.1.39-150200.5.36.1.noarch", }, }, { category: "product_version", name: "tomcat10-docs-webapp-10.1.39-150200.5.36.1.noarch", product: { name: "tomcat10-docs-webapp-10.1.39-150200.5.36.1.noarch", product_id: "tomcat10-docs-webapp-10.1.39-150200.5.36.1.noarch", }, }, { category: "product_version", name: "tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", product: { name: "tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", product_id: "tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", }, }, { category: "product_version", name: "tomcat10-embed-10.1.39-150200.5.36.1.noarch", product: { name: "tomcat10-embed-10.1.39-150200.5.36.1.noarch", product_id: "tomcat10-embed-10.1.39-150200.5.36.1.noarch", }, }, { category: "product_version", name: "tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", product: { name: "tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", product_id: "tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", }, }, { category: "product_version", name: "tomcat10-jsvc-10.1.39-150200.5.36.1.noarch", product: { name: "tomcat10-jsvc-10.1.39-150200.5.36.1.noarch", product_id: "tomcat10-jsvc-10.1.39-150200.5.36.1.noarch", }, }, { category: "product_version", name: "tomcat10-lib-10.1.39-150200.5.36.1.noarch", product: { name: "tomcat10-lib-10.1.39-150200.5.36.1.noarch", product_id: "tomcat10-lib-10.1.39-150200.5.36.1.noarch", }, }, { category: "product_version", name: "tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", product: { name: "tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", product_id: "tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", }, }, { category: "product_version", name: "tomcat10-webapps-10.1.39-150200.5.36.1.noarch", product: { name: "tomcat10-webapps-10.1.39-150200.5.36.1.noarch", product_id: "tomcat10-webapps-10.1.39-150200.5.36.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product: { name: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-web-scripting:15:sp6", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-espos:15:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product: { name: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-ltss:15:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15 SP5-LTSS", product: { name: "SUSE Linux Enterprise Server 15 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15:sp5", }, }, }, { category: "product_name", name: "openSUSE Leap 15.6", product: { name: "openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.6", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "tomcat10-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", }, { category: "default_component_of", full_product_name: { name: "tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", }, { category: "default_component_of", full_product_name: { name: "tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", }, { category: "default_component_of", full_product_name: { name: "tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", }, { category: "default_component_of", full_product_name: { name: "tomcat10-lib-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-lib-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", }, { category: "default_component_of", full_product_name: { name: "tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", }, { category: "default_component_of", full_product_name: { name: "tomcat10-webapps-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP6", product_id: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-webapps-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Web and Scripting 15 SP6", }, { category: "default_component_of", full_product_name: { name: "tomcat10-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-lib-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-lib-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-webapps-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-webapps-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-lib-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-lib-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-webapps-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-webapps-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-lib-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-lib-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-webapps-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", product_id: "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-webapps-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15 SP5-LTSS", }, { category: "default_component_of", full_product_name: { name: "tomcat10-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", }, { category: "default_component_of", full_product_name: { name: "tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", }, { category: "default_component_of", full_product_name: { name: "tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", }, { category: "default_component_of", full_product_name: { name: "tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", }, { category: "default_component_of", full_product_name: { name: "tomcat10-lib-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-lib-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", }, { category: "default_component_of", full_product_name: { name: "tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", }, { category: "default_component_of", full_product_name: { name: "tomcat10-webapps-10.1.39-150200.5.36.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-webapps-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15 SP5", }, { category: "default_component_of", full_product_name: { name: "tomcat10-10.1.39-150200.5.36.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat10-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat10-doc-10.1.39-150200.5.36.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat10-doc-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-doc-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat10-docs-webapp-10.1.39-150200.5.36.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-docs-webapp-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat10-embed-10.1.39-150200.5.36.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat10-embed-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-embed-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat10-jsvc-10.1.39-150200.5.36.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat10-jsvc-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-jsvc-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat10-lib-10.1.39-150200.5.36.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat10-lib-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-lib-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, { category: "default_component_of", full_product_name: { name: "tomcat10-webapps-10.1.39-150200.5.36.1.noarch as component of openSUSE Leap 15.6", product_id: "openSUSE Leap 15.6:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", }, product_reference: "tomcat10-webapps-10.1.39-150200.5.36.1.noarch", relates_to_product_reference: "openSUSE Leap 15.6", }, ], }, vulnerabilities: [ { cve: "CVE-2024-56337", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2024-56337", }, ], notes: [ { category: "general", text: "Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache Tomcat.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.\n\nThe mitigation for CVE-2024-50379 was incomplete.\n\nUsers running Tomcat on a case insensitive file system with the default servlet write enabled (readonly initialisation \nparameter set to the non-default value of false) may need additional configuration to fully mitigate CVE-2024-50379 depending on which version of Java they are using with Tomcat:\n- running on Java 8 or Java 11: the system property sun.io.useCanonCaches must be explicitly set to false (it defaults to true)\n- running on Java 17: the system property sun.io.useCanonCaches, if set, must be set to false (it defaults to false)\n- running on Java 21 onwards: no further configuration is required (the system property and the problematic cache have been removed)\n\nTomcat 11.0.3, 10.1.35 and 9.0.99 onwards will include checks that sun.io.useCanonCaches is set appropriately before allowing the default servlet to be write enabled on a case insensitive file system. Tomcat will also set sun.io.useCanonCaches to false by default where it can.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-doc-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-embed-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-jsvc-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2024-56337", url: "https://www.suse.com/security/cve/CVE-2024-56337", }, { category: "external", summary: "SUSE Bug 1234663 for CVE-2024-56337", url: "https://bugzilla.suse.com/1234663", }, { category: "external", summary: "SUSE Bug 1236809 for CVE-2024-56337", url: "https://bugzilla.suse.com/1236809", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-doc-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-embed-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-jsvc-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-doc-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-embed-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-jsvc-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-03-26T11:29:12Z", details: "important", }, ], title: "CVE-2024-56337", }, { cve: "CVE-2025-24813", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2025-24813", }, ], notes: [ { category: "general", text: "Path Equivalence: 'file.Name' (Internal Dot) leading to Remote Code Execution and/or Information disclosure and/or malicious content added to uploaded files via write enabled Default Servlet in Apache Tomcat.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98.\n\nIf all of the following were true, a malicious user was able to view security sensitive files and/or inject content into those files:\n- writes enabled for the default servlet (disabled by default)\n- support for partial PUT (enabled by default)\n- a target URL for security sensitive uploads that was a sub-directory of a target URL for public uploads\n- attacker knowledge of the names of security sensitive files being uploaded\n- the security sensitive files also being uploaded via partial PUT\n\nIf all of the following were true, a malicious user was able to perform remote code execution:\n- writes enabled for the default servlet (disabled by default)\n- support for partial PUT (enabled by default)\n- application was using Tomcat's file based session persistence with the default storage location\n- application included a library that may be leveraged in a deserialization attack\n\nUsers are recommended to upgrade to version 11.0.3, 10.1.35 or 9.0.99, which fixes the issue.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-doc-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-embed-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-jsvc-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2025-24813", url: "https://www.suse.com/security/cve/CVE-2025-24813", }, { category: "external", summary: "SUSE Bug 1239302 for CVE-2025-24813", url: "https://bugzilla.suse.com/1239302", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-doc-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-embed-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-jsvc-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Module for Web and Scripting 15 SP6:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-admin-webapps-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-doc-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-docs-webapp-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-el-5_0-api-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-embed-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-jsvc-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-lib-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1.noarch", "openSUSE Leap 15.6:tomcat10-webapps-10.1.39-150200.5.36.1.noarch", ], }, ], threats: [ { category: "impact", date: "2025-03-26T11:29:12Z", details: "important", }, ], title: "CVE-2025-24813", }, ], }
fkie_cve-2024-56337
Vulnerability from fkie_nvd
Vendor | Product | Version |
---|
{ cveTags: [], descriptions: [ { lang: "en", value: "Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache Tomcat.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.\n\nThe mitigation for CVE-2024-50379 was incomplete.\n\nUsers running Tomcat on a case insensitive file system with the default servlet write enabled (readonly initialisation \nparameter set to the non-default value of false) may need additional configuration to fully mitigate CVE-2024-50379 depending on which version of Java they are using with Tomcat:\n- running on Java 8 or Java 11: the system property sun.io.useCanonCaches must be explicitly set to false (it defaults to true)\n- running on Java 17: the system property sun.io.useCanonCaches, if set, must be set to false (it defaults to false)\n- running on Java 21 onwards: no further configuration is required (the system property and the problematic cache have been removed)\n\nTomcat 11.0.3, 10.1.35 and 9.0.99 onwards will include checks that sun.io.useCanonCaches is set appropriately before allowing the default servlet to be write enabled on a case insensitive file system. Tomcat will also set sun.io.useCanonCaches to false by default where it can.", }, { lang: "es", value: "Vulnerabilidad de condición de ejecución de tiempo de uso y tiempo de verificación (TOCTOU) en Apache Tomcat. Este problema afecta a Apache Tomcat: desde 11.0.0-M1 hasta 11.0.1, desde 10.1.0-M1 hasta 10.1.33, desde 9.0.0.M1 hasta 9.0.97. La mitigación de CVE-2024-50379 fue incompleta. Los usuarios que ejecuten Tomcat en un sistema de archivos que no distinga entre mayúsculas y minúsculas con la escritura del servlet predeterminada habilitada (el parámetro de inicialización de solo lectura establecido en el valor no predeterminado de falso) pueden necesitar una configuración adicional para mitigar por completo CVE-2024-50379 según la versión de Java que estén usando con Tomcat: - ejecutándose en Java 8 o Java 11: la propiedad del sistema sun.io.useCanonCaches debe establecerse explícitamente en falso (el valor predeterminado es verdadero) - ejecutándose en Java 17: la propiedad del sistema sun.io.useCanonCaches, si está establecida, debe establecerse en falso (el valor predeterminado es falso) - ejecutándose en Java 21 en adelante: no se requiere ninguna configuración adicional (la propiedad del sistema y el caché problemático se han eliminado) Tomcat 11.0.3, 10.1.35 y 9.0.99 en adelante incluirán comprobaciones de que sun.io.useCanonCaches esté configurado correctamente antes de permitir que el servlet predeterminado esté habilitado para escritura en un sistema de archivos que no distinga entre mayúsculas y minúsculas. Tomcat también establecerá sun.io.useCanonCaches como falso de forma predeterminada cuando sea posible.", }, ], id: "CVE-2024-56337", lastModified: "2025-01-03T12:15:26.787", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }, published: "2024-12-20T16:15:24.260", references: [ { source: "security@apache.org", url: "https://lists.apache.org/thread/b2b9qrgjrz1kvo4ym8y2wkfdvwoq6qbp", }, { source: "security@apache.org", url: "https://www.cve.org/CVERecord?id=CVE-2024-50379", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://security.netapp.com/advisory/ntap-20250103-0002/", }, ], sourceIdentifier: "security@apache.org", vulnStatus: "Awaiting Analysis", weaknesses: [ { description: [ { lang: "en", value: "CWE-367", }, ], source: "security@apache.org", type: "Secondary", }, ], }
ghsa-27hp-xhwr-wr2m
Vulnerability from github
Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache Tomcat.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.
The mitigation for CVE-2024-50379 was incomplete.
Users running Tomcat on a case insensitive file system with the default servlet write enabled (readonly initialisation parameter set to the non-default value of false) may need additional configuration to fully mitigate CVE-2024-50379 depending on which version of Java they are using with Tomcat: - running on Java 8 or Java 11: the system property sun.io.useCanonCaches must be explicitly set to false (it defaults to true) - running on Java 17: the system property sun.io.useCanonCaches, if set, must be set to false (it defaults to false) - running on Java 21 onwards: no further configuration is required (the system property and the problematic cache have been removed)
Tomcat 11.0.3, 10.1.35 and 9.0.99 onwards will include checks that sun.io.useCanonCaches is set appropriately before allowing the default servlet to be write enabled on a case insensitive file system. Tomcat will also set sun.io.useCanonCaches to false by default where it can.
{ affected: [ { package: { ecosystem: "Maven", name: "org.apache.tomcat:tomcat-catalina", }, ranges: [ { events: [ { introduced: "11.0.0-M1", }, { fixed: "11.0.2", }, ], type: "ECOSYSTEM", }, ], }, { package: { ecosystem: "Maven", name: "org.apache.tomcat:tomcat-catalina", }, ranges: [ { events: [ { introduced: "10.1.0-M1", }, { fixed: "10.1.34", }, ], type: "ECOSYSTEM", }, ], }, { package: { ecosystem: "Maven", name: "org.apache.tomcat:tomcat-embed-core", }, ranges: [ { events: [ { introduced: "9.0.0.M1", }, { fixed: "9.0.98", }, ], type: "ECOSYSTEM", }, ], }, { package: { ecosystem: "Maven", name: "org.apache.tomcat.embed:tomcat-embed-core", }, ranges: [ { events: [ { introduced: "11.0.0-M1", }, { fixed: "11.0.2", }, ], type: "ECOSYSTEM", }, ], }, { package: { ecosystem: "Maven", name: "org.apache.tomcat.embed:tomcat-embed-core", }, ranges: [ { events: [ { introduced: "10.1.0-M1", }, { fixed: "10.1.34", }, ], type: "ECOSYSTEM", }, ], }, { package: { ecosystem: "Maven", name: "org.apache.tomcat.embed:tomcat-embed-core", }, ranges: [ { events: [ { introduced: "9.0.0.M1", }, { fixed: "9.0.98", }, ], type: "ECOSYSTEM", }, ], }, ], aliases: [ "CVE-2024-56337", ], database_specific: { cwe_ids: [ "CWE-367", ], github_reviewed: true, github_reviewed_at: "2024-12-20T19:50:45Z", nvd_published_at: "2024-12-20T16:15:24Z", severity: "HIGH", }, details: "Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache Tomcat.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.\n\nThe mitigation for CVE-2024-50379 was incomplete.\n\nUsers running Tomcat on a case insensitive file system with the default servlet write enabled (readonly initialisation \nparameter set to the non-default value of false) may need additional configuration to fully mitigate CVE-2024-50379 depending on which version of Java they are using with Tomcat:\n- running on Java 8 or Java 11: the system property sun.io.useCanonCaches must be explicitly set to false (it defaults to true)\n- running on Java 17: the system property sun.io.useCanonCaches, if set, must be set to false (it defaults to false)\n- running on Java 21 onwards: no further configuration is required (the system property and the problematic cache have been removed)\n\nTomcat 11.0.3, 10.1.35 and 9.0.99 onwards will include checks that sun.io.useCanonCaches is set appropriately before allowing the default servlet to be write enabled on a case insensitive file system. Tomcat will also set sun.io.useCanonCaches to false by default where it can.", id: "GHSA-27hp-xhwr-wr2m", modified: "2025-01-08T16:05:12Z", published: "2024-12-20T18:31:32Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2024-56337", }, { type: "PACKAGE", url: "https://github.com/apache/tomcat", }, { type: "WEB", url: "https://lists.apache.org/thread/b2b9qrgjrz1kvo4ym8y2wkfdvwoq6qbp", }, { type: "WEB", url: "https://security.netapp.com/advisory/ntap-20250103-0002", }, { type: "WEB", url: "https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.34", }, { type: "WEB", url: "https://tomcat.apache.org/security-11.html#Fixed_in_Apache_Tomcat_11.0.2", }, { type: "WEB", url: "https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.98", }, { type: "WEB", url: "https://www.cve.org/CVERecord?id=CVE-2024-50379", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U", type: "CVSS_V4", }, ], summary: "Apache Tomcat Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability", }
Log in or create an account to share your comment.
This schema specifies the format of a comment related to a security advisory.
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.