suse-su-2024:1204-1
Vulnerability from csaf_suse
Published
2024-04-11 10:43
    Modified
2024-04-11 10:43
    Summary
Security update for tomcat10
    Notes
Title of the patch
Security update for tomcat10
    Description of the patch
This update for tomcat10 fixes the following issues:
- CVE-2024-24549: Fixed denial of service during header validation for HTTP/2 stream (bsc#1221386)
- CVE-2024-23672: Fixed denial of service due to malicious WebSocket client keeping connection open (bsc#1221385)
Other fixes:
- Update to Tomcat 10.1.20
  * Catalina
    + Fix:  Minor performance improvement for building filter chains. 
      Based on ideas from #702 by Luke Miao. (remm)
    + Fix:  Align error handling for Writer and OutputStream. Ensure 
      use of either once the response has been recycled triggers a 
      NullPointerException provided that discardFacades is configured with 
      the default value of true. (markt)
    + Fix:  68692: The standard thread pool implementations that are 
      configured using the Executor element now implement ExecutorService 
      for better support NIO2. (remm)
    + Fix:  68495: When restoring a saved POST request after a 
      successful FORM authentication, ensure that neither the URI, the 
      query string nor the protocol are corrupted when restoring the 
      request body. (markt)
    + Fix:  After forwarding a request, attempt to unwrap the 
      response in order to suspend it, instead of simply closing it if it 
      was wrapped. Add a new suspendWrappedResponseAfterForward boolean 
      attribute on Context to control the bahavior, defaulting to false. 
      (remm)
    + Fix:  68721: Workaround a possible cause of duplicate class 
      definitions when using ClassFileTransformers and the transformation 
      of a class also triggers the loading of the same class. (markt)
    + Fix:  The rewrite valve should not do a rewrite if the output 
      is identical to the input. (remm)
    + Update:  Add a new valveSkip (or VS) rule flag to the rewrite 
      valve to allow skipping over the next valve in the Catalina pipeline. 
      (remm)
    + Update:  Add highConcurrencyStatus attribute to the 
      SemaphoreValve to optionally allow the valve to return an error 
      status code to the client when a permit cannot be acquired from the 
      semaphore. (remm)
    + Add:  Add checking of the 'age' of the running Tomcat instance 
      since its build-date to the SecurityListener, and log a warning if 
      the server is old. (schultz)
    + Fix:  When using the AsyncContext, throw an 
      IllegalStateException, rather than allowing an NullPointerException, 
      if an attempt is made to use the AsyncContext after it has been 
      recycled. (markt)
    + Fix:  Correct JPMS and OSGi meta-data for tomcat-embed-core.jar 
      by removing reference to org.apache.catalina.ssi package that is no 
      longer included in the JAR. Based on pull request #684 by Jendrik 
      Johannes. (markt)
    + Fix:  Fix ServiceBindingPropertySource so that trailing \r\n 
      sequences are correctly removed from files containing property values 
      when configured to do so. Bug identified by Coverity Scan. (markt)
    + Add:  Add improvements to the CSRF prevention filter including 
      the ability to skip adding nonces for resource name and subtree URL 
      patterns. (schultz)
    + Fix:  Review usage of debug logging and downgrade trace or data 
      dumping operations from debug level to trace. (remm)
    + Fix:  68089: Further improve the performance of request 
      attribute access for ApplicationHttpRequest and ApplicationRequest. 
      (markt)
    + Fix:  68559: Allow asynchronous error handling to write to the 
      response after an error during asynchronous processing. (markt)
  * Coyote
    + Fix:  Improve the HTTP/2 stream prioritisation process. If a 
      stream uses all of the connection windows and still has content to 
      write, it will now be added to the backlog immediately rather than 
      waiting until the write attempt for the remaining content. (markt)
    + Fix:  Add threadsMaxIdleTime attribute to the endpoint, to 
      allow configuring the amount of time before an internal executor will 
      scale back to the configured minSpareThreads size. (remm)
    + Fix:  Correct a regression in the support for user provided 
      SSLContext instances that broke the 
      org.apache.catalina.security.TLSCertificateReloadListener. (markt)
    + Fix:  Setting a null value for a cookie attribute should remove 
      the attribute. (markt)
    + Fix:  Make asynchronous error handling more robust. Ensure that 
      once a connection is marked to be closed, further asynchronous 
      processing cannot change that. (markt)
    + Fix:  Make asynchronous error handling more robust. Ensure that 
      once the call to AsyncListener.onError() has returned to the 
      container, only container threads can access the AsyncContext. This 
      protects against various race conditions that woudl otherwise occur 
      if application threads continued to access the AsyncContext.
    + Fix:  Review usage of debug logging and downgrade trace or data 
      dumping operations from debug level to trace. In particular, most of 
      the HTTP/2 debug logging has been changed to trace level. (remm)
    + Fix:  Add support for user provided SSLContext instances 
      configured on SSLHostConfigCertificate instances. Based on pull 
      request #673 provided by Hakan Altındağ. (markt)
    + Fix:  Partial fix for 68558: Cache the result of converting to 
      String for request URI, HTTP header names and the request 
      Content-Type value to improve performance by reducing repeated byte[] 
      to String conversions. (markt)
    + Fix:  Improve error reporting to HTTP/2 clients for header 
      processing errors by reporting problems at the end of the frame where 
      the error was detected rather than at the end of the headers. (markt)
    + Fix:  Remove the remaining reference to a stream once the 
      stream has been recycled. This makes the stream eligible for garbage 
      collection earlier and thereby improves scalability. (markt)
  * Jasper
    + Add:  Add support for specifying Java 22 (with the value 22) as 
      the compiler source and/or compiler target for JSP compilation. If 
      used with an Eclipse JDT compiler version that does not support these 
      values, a warning will be logged and the default will used. (markt)
    + Fix:  Handle the case where the JSP engine forwards a 
      request/response to a Servlet that uses an OutputStream rather than a 
      Writer. This was triggering an IllegalStateException on code paths 
      where there was a subsequent attempt to obtain a Writer. (markt)
    + Fix:  Correctly handle the case where a tag library is packaged 
      in a JAR file and the web application is deployed as a WAR file 
      rather than an unpacked directory. (markt)
    + Fix:  68546: Generate optimal size and types for JSP imports 
      maps, as suggested by John Engebretson. (remm)
    + Fix:  Review usage of debug logging and downgrade trace or data 
      dumping operations from debug level to trace. (remm)
  *	Cluster
    + Fix:  Avoid updating request count stats on async. (remm)
  * WebSocket
    + Fix:  Correct a regression in the fix for 66508 that could 
      cause an UpgradeProcessor leak in some circumstances. (markt)
    + Fix:  Review usage of debug logging and downgrade trace or data 
      dumping operations from debug level to trace. (remm)
    + Fix:  Ensure that WebSocket connection closure completes if the 
      connection is closed when the server side has used the proprietary 
      suspend/resume feature to suspend the connection. (markt)
  * Web applications
      Add:  Add support for responses in JSON format from the examples 
      application RequestHeaderExample. (schultz)
  * Other
    + Add:  Improvements to French translations. (remm)
    + Add:  Improvements to Japanese translations by tak7iji. (markt)
    + Fix:  57130: Allow digest.(sh|bat) to accept password from a 
      file or stdin. (csutherl/schultz)
    + Update:  Update Checkstyle to 10.14.1. (markt)
    + Fix:  Correct the remaining OSGi contract references in the 
      manifest files to refer to the Jakarta EE contract names rather than 
      the Java EE contract names. Based on pull request #685 provided by 
      Paul A. Nicolucci. (markt)
    + Update:  Update Checkstyle to 10.13.0. (markt)
    + Update:  Update JSign to 6.0. (markt)
    + Update:  Update the packaged version of the Tomcat Migration 
      Tool for Jakarta EE to 1.0.7. (markt)
    + Update:  Update Tomcat Native to 2.0.7. (markt)
    + Update:  Add strings for debug level messages. (remm)
    + Add:  Improvements to French translations. (remm)
    + Add:  Improvements to Japanese translations by tak7iji. (markt)
    Patchnames
SUSE-2024-1204,SUSE-SLE-Module-Web-Scripting-15-SP5-2024-1204,openSUSE-SLE-15.5-2024-1204
    Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
    {
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for tomcat10",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for tomcat10 fixes the following issues:\n\n- CVE-2024-24549: Fixed denial of service during header validation for HTTP/2 stream (bsc#1221386)\n- CVE-2024-23672: Fixed denial of service due to malicious WebSocket client keeping connection open (bsc#1221385)\n\nOther fixes:\n- Update to Tomcat 10.1.20\n  * Catalina\n    + Fix:  Minor performance improvement for building filter chains. \n      Based on ideas from #702 by Luke Miao. (remm)\n    + Fix:  Align error handling for Writer and OutputStream. Ensure \n      use of either once the response has been recycled triggers a \n      NullPointerException provided that discardFacades is configured with \n      the default value of true. (markt)\n    + Fix:  68692: The standard thread pool implementations that are \n      configured using the Executor element now implement ExecutorService \n      for better support NIO2. (remm)\n    + Fix:  68495: When restoring a saved POST request after a \n      successful FORM authentication, ensure that neither the URI, the \n      query string nor the protocol are corrupted when restoring the \n      request body. (markt)\n    + Fix:  After forwarding a request, attempt to unwrap the \n      response in order to suspend it, instead of simply closing it if it \n      was wrapped. Add a new suspendWrappedResponseAfterForward boolean \n      attribute on Context to control the bahavior, defaulting to false. \n      (remm)\n    + Fix:  68721: Workaround a possible cause of duplicate class \n      definitions when using ClassFileTransformers and the transformation \n      of a class also triggers the loading of the same class. (markt)\n    + Fix:  The rewrite valve should not do a rewrite if the output \n      is identical to the input. (remm)\n    + Update:  Add a new valveSkip (or VS) rule flag to the rewrite \n      valve to allow skipping over the next valve in the Catalina pipeline. \n      (remm)\n    + Update:  Add highConcurrencyStatus attribute to the \n      SemaphoreValve to optionally allow the valve to return an error \n      status code to the client when a permit cannot be acquired from the \n      semaphore. (remm)\n    + Add:  Add checking of the \u0027age\u0027 of the running Tomcat instance \n      since its build-date to the SecurityListener, and log a warning if \n      the server is old. (schultz)\n    + Fix:  When using the AsyncContext, throw an \n      IllegalStateException, rather than allowing an NullPointerException, \n      if an attempt is made to use the AsyncContext after it has been \n      recycled. (markt)\n    + Fix:  Correct JPMS and OSGi meta-data for tomcat-embed-core.jar \n      by removing reference to org.apache.catalina.ssi package that is no \n      longer included in the JAR. Based on pull request #684 by Jendrik \n      Johannes. (markt)\n    + Fix:  Fix ServiceBindingPropertySource so that trailing \\r\\n \n      sequences are correctly removed from files containing property values \n      when configured to do so. Bug identified by Coverity Scan. (markt)\n    + Add:  Add improvements to the CSRF prevention filter including \n      the ability to skip adding nonces for resource name and subtree URL \n      patterns. (schultz)\n    + Fix:  Review usage of debug logging and downgrade trace or data \n      dumping operations from debug level to trace. (remm)\n    + Fix:  68089: Further improve the performance of request \n      attribute access for ApplicationHttpRequest and ApplicationRequest. \n      (markt)\n    + Fix:  68559: Allow asynchronous error handling to write to the \n      response after an error during asynchronous processing. (markt)\n  * Coyote\n    + Fix:  Improve the HTTP/2 stream prioritisation process. If a \n      stream uses all of the connection windows and still has content to \n      write, it will now be added to the backlog immediately rather than \n      waiting until the write attempt for the remaining content. (markt)\n    + Fix:  Add threadsMaxIdleTime attribute to the endpoint, to \n      allow configuring the amount of time before an internal executor will \n      scale back to the configured minSpareThreads size. (remm)\n    + Fix:  Correct a regression in the support for user provided \n      SSLContext instances that broke the \n      org.apache.catalina.security.TLSCertificateReloadListener. (markt)\n    + Fix:  Setting a null value for a cookie attribute should remove \n      the attribute. (markt)\n    + Fix:  Make asynchronous error handling more robust. Ensure that \n      once a connection is marked to be closed, further asynchronous \n      processing cannot change that. (markt)\n    + Fix:  Make asynchronous error handling more robust. Ensure that \n      once the call to AsyncListener.onError() has returned to the \n      container, only container threads can access the AsyncContext. This \n      protects against various race conditions that woudl otherwise occur \n      if application threads continued to access the AsyncContext.\n    + Fix:  Review usage of debug logging and downgrade trace or data \n      dumping operations from debug level to trace. In particular, most of \n      the HTTP/2 debug logging has been changed to trace level. (remm)\n    + Fix:  Add support for user provided SSLContext instances \n      configured on SSLHostConfigCertificate instances. Based on pull \n      request #673 provided by Hakan Alt\u0131nda\u011f. (markt)\n    + Fix:  Partial fix for 68558: Cache the result of converting to \n      String for request URI, HTTP header names and the request \n      Content-Type value to improve performance by reducing repeated byte[] \n      to String conversions. (markt)\n    + Fix:  Improve error reporting to HTTP/2 clients for header \n      processing errors by reporting problems at the end of the frame where \n      the error was detected rather than at the end of the headers. (markt)\n    + Fix:  Remove the remaining reference to a stream once the \n      stream has been recycled. This makes the stream eligible for garbage \n      collection earlier and thereby improves scalability. (markt)\n  * Jasper\n    + Add:  Add support for specifying Java 22 (with the value 22) as \n      the compiler source and/or compiler target for JSP compilation. If \n      used with an Eclipse JDT compiler version that does not support these \n      values, a warning will be logged and the default will used. (markt)\n    + Fix:  Handle the case where the JSP engine forwards a \n      request/response to a Servlet that uses an OutputStream rather than a \n      Writer. This was triggering an IllegalStateException on code paths \n      where there was a subsequent attempt to obtain a Writer. (markt)\n    + Fix:  Correctly handle the case where a tag library is packaged \n      in a JAR file and the web application is deployed as a WAR file \n      rather than an unpacked directory. (markt)\n    + Fix:  68546: Generate optimal size and types for JSP imports \n      maps, as suggested by John Engebretson. (remm)\n    + Fix:  Review usage of debug logging and downgrade trace or data \n      dumping operations from debug level to trace. (remm)\n  *\tCluster\n    + Fix:  Avoid updating request count stats on async. (remm)\n  * WebSocket\n    + Fix:  Correct a regression in the fix for 66508 that could \n      cause an UpgradeProcessor leak in some circumstances. (markt)\n    + Fix:  Review usage of debug logging and downgrade trace or data \n      dumping operations from debug level to trace. (remm)\n    + Fix:  Ensure that WebSocket connection closure completes if the \n      connection is closed when the server side has used the proprietary \n      suspend/resume feature to suspend the connection. (markt)\n  * Web applications\n      Add:  Add support for responses in JSON format from the examples \n      application RequestHeaderExample. (schultz)\n  * Other\n    + Add:  Improvements to French translations. (remm)\n    + Add:  Improvements to Japanese translations by tak7iji. (markt)\n    + Fix:  57130: Allow digest.(sh|bat) to accept password from a \n      file or stdin. (csutherl/schultz)\n    + Update:  Update Checkstyle to 10.14.1. (markt)\n    + Fix:  Correct the remaining OSGi contract references in the \n      manifest files to refer to the Jakarta EE contract names rather than \n      the Java EE contract names. Based on pull request #685 provided by \n      Paul A. Nicolucci. (markt)\n    + Update:  Update Checkstyle to 10.13.0. (markt)\n    + Update:  Update JSign to 6.0. (markt)\n    + Update:  Update the packaged version of the Tomcat Migration \n      Tool for Jakarta EE to 1.0.7. (markt)\n    + Update:  Update Tomcat Native to 2.0.7. (markt)\n    + Update:  Add strings for debug level messages. (remm)\n    + Add:  Improvements to French translations. (remm)\n    + Add:  Improvements to Japanese translations by tak7iji. (markt)\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2024-1204,SUSE-SLE-Module-Web-Scripting-15-SP5-2024-1204,openSUSE-SLE-15.5-2024-1204",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_1204-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2024:1204-1",
        "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20241204-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2024:1204-1",
        "url": "https://lists.suse.com/pipermail/sle-updates/2024-April/034931.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1221385",
        "url": "https://bugzilla.suse.com/1221385"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1221386",
        "url": "https://bugzilla.suse.com/1221386"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-23672 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-23672/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-24549 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-24549/"
      }
    ],
    "title": "Security update for tomcat10",
    "tracking": {
      "current_release_date": "2024-04-11T10:43:42Z",
      "generator": {
        "date": "2024-04-11T10:43:42Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2024:1204-1",
      "initial_release_date": "2024-04-11T10:43:42Z",
      "revision_history": [
        {
          "date": "2024-04-11T10:43:42Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tomcat10-10.1.20-150200.5.22.2.noarch",
                "product": {
                  "name": "tomcat10-10.1.20-150200.5.22.2.noarch",
                  "product_id": "tomcat10-10.1.20-150200.5.22.2.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "tomcat10-admin-webapps-10.1.20-150200.5.22.2.noarch",
                "product": {
                  "name": "tomcat10-admin-webapps-10.1.20-150200.5.22.2.noarch",
                  "product_id": "tomcat10-admin-webapps-10.1.20-150200.5.22.2.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "tomcat10-doc-10.1.20-150200.5.22.2.noarch",
                "product": {
                  "name": "tomcat10-doc-10.1.20-150200.5.22.2.noarch",
                  "product_id": "tomcat10-doc-10.1.20-150200.5.22.2.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "tomcat10-docs-webapp-10.1.20-150200.5.22.2.noarch",
                "product": {
                  "name": "tomcat10-docs-webapp-10.1.20-150200.5.22.2.noarch",
                  "product_id": "tomcat10-docs-webapp-10.1.20-150200.5.22.2.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "tomcat10-el-5_0-api-10.1.20-150200.5.22.2.noarch",
                "product": {
                  "name": "tomcat10-el-5_0-api-10.1.20-150200.5.22.2.noarch",
                  "product_id": "tomcat10-el-5_0-api-10.1.20-150200.5.22.2.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "tomcat10-embed-10.1.20-150200.5.22.2.noarch",
                "product": {
                  "name": "tomcat10-embed-10.1.20-150200.5.22.2.noarch",
                  "product_id": "tomcat10-embed-10.1.20-150200.5.22.2.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "tomcat10-jsp-3_1-api-10.1.20-150200.5.22.2.noarch",
                "product": {
                  "name": "tomcat10-jsp-3_1-api-10.1.20-150200.5.22.2.noarch",
                  "product_id": "tomcat10-jsp-3_1-api-10.1.20-150200.5.22.2.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "tomcat10-jsvc-10.1.20-150200.5.22.2.noarch",
                "product": {
                  "name": "tomcat10-jsvc-10.1.20-150200.5.22.2.noarch",
                  "product_id": "tomcat10-jsvc-10.1.20-150200.5.22.2.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "tomcat10-lib-10.1.20-150200.5.22.2.noarch",
                "product": {
                  "name": "tomcat10-lib-10.1.20-150200.5.22.2.noarch",
                  "product_id": "tomcat10-lib-10.1.20-150200.5.22.2.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "tomcat10-servlet-6_0-api-10.1.20-150200.5.22.2.noarch",
                "product": {
                  "name": "tomcat10-servlet-6_0-api-10.1.20-150200.5.22.2.noarch",
                  "product_id": "tomcat10-servlet-6_0-api-10.1.20-150200.5.22.2.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "tomcat10-webapps-10.1.20-150200.5.22.2.noarch",
                "product": {
                  "name": "tomcat10-webapps-10.1.20-150200.5.22.2.noarch",
                  "product_id": "tomcat10-webapps-10.1.20-150200.5.22.2.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Module for Web and Scripting 15 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Module for Web and Scripting 15 SP5",
                  "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-web-scripting:15:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "openSUSE Leap 15.5",
                "product": {
                  "name": "openSUSE Leap 15.5",
                  "product_id": "openSUSE Leap 15.5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:leap:15.5"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat10-10.1.20-150200.5.22.2.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-10.1.20-150200.5.22.2.noarch"
        },
        "product_reference": "tomcat10-10.1.20-150200.5.22.2.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat10-admin-webapps-10.1.20-150200.5.22.2.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-admin-webapps-10.1.20-150200.5.22.2.noarch"
        },
        "product_reference": "tomcat10-admin-webapps-10.1.20-150200.5.22.2.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat10-el-5_0-api-10.1.20-150200.5.22.2.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-el-5_0-api-10.1.20-150200.5.22.2.noarch"
        },
        "product_reference": "tomcat10-el-5_0-api-10.1.20-150200.5.22.2.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat10-jsp-3_1-api-10.1.20-150200.5.22.2.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-jsp-3_1-api-10.1.20-150200.5.22.2.noarch"
        },
        "product_reference": "tomcat10-jsp-3_1-api-10.1.20-150200.5.22.2.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat10-lib-10.1.20-150200.5.22.2.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-lib-10.1.20-150200.5.22.2.noarch"
        },
        "product_reference": "tomcat10-lib-10.1.20-150200.5.22.2.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat10-servlet-6_0-api-10.1.20-150200.5.22.2.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-servlet-6_0-api-10.1.20-150200.5.22.2.noarch"
        },
        "product_reference": "tomcat10-servlet-6_0-api-10.1.20-150200.5.22.2.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat10-webapps-10.1.20-150200.5.22.2.noarch as component of SUSE Linux Enterprise Module for Web and Scripting 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-webapps-10.1.20-150200.5.22.2.noarch"
        },
        "product_reference": "tomcat10-webapps-10.1.20-150200.5.22.2.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Web and Scripting 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat10-10.1.20-150200.5.22.2.noarch as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:tomcat10-10.1.20-150200.5.22.2.noarch"
        },
        "product_reference": "tomcat10-10.1.20-150200.5.22.2.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat10-admin-webapps-10.1.20-150200.5.22.2.noarch as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:tomcat10-admin-webapps-10.1.20-150200.5.22.2.noarch"
        },
        "product_reference": "tomcat10-admin-webapps-10.1.20-150200.5.22.2.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat10-docs-webapp-10.1.20-150200.5.22.2.noarch as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:tomcat10-docs-webapp-10.1.20-150200.5.22.2.noarch"
        },
        "product_reference": "tomcat10-docs-webapp-10.1.20-150200.5.22.2.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat10-el-5_0-api-10.1.20-150200.5.22.2.noarch as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:tomcat10-el-5_0-api-10.1.20-150200.5.22.2.noarch"
        },
        "product_reference": "tomcat10-el-5_0-api-10.1.20-150200.5.22.2.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat10-embed-10.1.20-150200.5.22.2.noarch as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:tomcat10-embed-10.1.20-150200.5.22.2.noarch"
        },
        "product_reference": "tomcat10-embed-10.1.20-150200.5.22.2.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat10-jsp-3_1-api-10.1.20-150200.5.22.2.noarch as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:tomcat10-jsp-3_1-api-10.1.20-150200.5.22.2.noarch"
        },
        "product_reference": "tomcat10-jsp-3_1-api-10.1.20-150200.5.22.2.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat10-jsvc-10.1.20-150200.5.22.2.noarch as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:tomcat10-jsvc-10.1.20-150200.5.22.2.noarch"
        },
        "product_reference": "tomcat10-jsvc-10.1.20-150200.5.22.2.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat10-lib-10.1.20-150200.5.22.2.noarch as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:tomcat10-lib-10.1.20-150200.5.22.2.noarch"
        },
        "product_reference": "tomcat10-lib-10.1.20-150200.5.22.2.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat10-servlet-6_0-api-10.1.20-150200.5.22.2.noarch as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:tomcat10-servlet-6_0-api-10.1.20-150200.5.22.2.noarch"
        },
        "product_reference": "tomcat10-servlet-6_0-api-10.1.20-150200.5.22.2.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat10-webapps-10.1.20-150200.5.22.2.noarch as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:tomcat10-webapps-10.1.20-150200.5.22.2.noarch"
        },
        "product_reference": "tomcat10-webapps-10.1.20-150200.5.22.2.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-23672",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-23672"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Denial of Service via incomplete cleanup vulnerability in Apache Tomcat. It was possible for WebSocket clients to keep WebSocket connections open leading to increased resource consumption.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M16, from 10.1.0-M1 through 10.1.18, from 9.0.0-M1 through 9.0.85, from 8.5.0 through 8.5.98.\n\nUsers are recommended to upgrade to version 11.0.0-M17, 10.1.19, 9.0.86 or 8.5.99 which fix the issue.\n\n",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-10.1.20-150200.5.22.2.noarch",
          "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-admin-webapps-10.1.20-150200.5.22.2.noarch",
          "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-el-5_0-api-10.1.20-150200.5.22.2.noarch",
          "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-jsp-3_1-api-10.1.20-150200.5.22.2.noarch",
          "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-lib-10.1.20-150200.5.22.2.noarch",
          "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-servlet-6_0-api-10.1.20-150200.5.22.2.noarch",
          "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-webapps-10.1.20-150200.5.22.2.noarch",
          "openSUSE Leap 15.5:tomcat10-10.1.20-150200.5.22.2.noarch",
          "openSUSE Leap 15.5:tomcat10-admin-webapps-10.1.20-150200.5.22.2.noarch",
          "openSUSE Leap 15.5:tomcat10-docs-webapp-10.1.20-150200.5.22.2.noarch",
          "openSUSE Leap 15.5:tomcat10-el-5_0-api-10.1.20-150200.5.22.2.noarch",
          "openSUSE Leap 15.5:tomcat10-embed-10.1.20-150200.5.22.2.noarch",
          "openSUSE Leap 15.5:tomcat10-jsp-3_1-api-10.1.20-150200.5.22.2.noarch",
          "openSUSE Leap 15.5:tomcat10-jsvc-10.1.20-150200.5.22.2.noarch",
          "openSUSE Leap 15.5:tomcat10-lib-10.1.20-150200.5.22.2.noarch",
          "openSUSE Leap 15.5:tomcat10-servlet-6_0-api-10.1.20-150200.5.22.2.noarch",
          "openSUSE Leap 15.5:tomcat10-webapps-10.1.20-150200.5.22.2.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-23672",
          "url": "https://www.suse.com/security/cve/CVE-2024-23672"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221385 for CVE-2024-23672",
          "url": "https://bugzilla.suse.com/1221385"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-10.1.20-150200.5.22.2.noarch",
            "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-admin-webapps-10.1.20-150200.5.22.2.noarch",
            "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-el-5_0-api-10.1.20-150200.5.22.2.noarch",
            "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-jsp-3_1-api-10.1.20-150200.5.22.2.noarch",
            "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-lib-10.1.20-150200.5.22.2.noarch",
            "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-servlet-6_0-api-10.1.20-150200.5.22.2.noarch",
            "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-webapps-10.1.20-150200.5.22.2.noarch",
            "openSUSE Leap 15.5:tomcat10-10.1.20-150200.5.22.2.noarch",
            "openSUSE Leap 15.5:tomcat10-admin-webapps-10.1.20-150200.5.22.2.noarch",
            "openSUSE Leap 15.5:tomcat10-docs-webapp-10.1.20-150200.5.22.2.noarch",
            "openSUSE Leap 15.5:tomcat10-el-5_0-api-10.1.20-150200.5.22.2.noarch",
            "openSUSE Leap 15.5:tomcat10-embed-10.1.20-150200.5.22.2.noarch",
            "openSUSE Leap 15.5:tomcat10-jsp-3_1-api-10.1.20-150200.5.22.2.noarch",
            "openSUSE Leap 15.5:tomcat10-jsvc-10.1.20-150200.5.22.2.noarch",
            "openSUSE Leap 15.5:tomcat10-lib-10.1.20-150200.5.22.2.noarch",
            "openSUSE Leap 15.5:tomcat10-servlet-6_0-api-10.1.20-150200.5.22.2.noarch",
            "openSUSE Leap 15.5:tomcat10-webapps-10.1.20-150200.5.22.2.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-10.1.20-150200.5.22.2.noarch",
            "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-admin-webapps-10.1.20-150200.5.22.2.noarch",
            "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-el-5_0-api-10.1.20-150200.5.22.2.noarch",
            "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-jsp-3_1-api-10.1.20-150200.5.22.2.noarch",
            "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-lib-10.1.20-150200.5.22.2.noarch",
            "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-servlet-6_0-api-10.1.20-150200.5.22.2.noarch",
            "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-webapps-10.1.20-150200.5.22.2.noarch",
            "openSUSE Leap 15.5:tomcat10-10.1.20-150200.5.22.2.noarch",
            "openSUSE Leap 15.5:tomcat10-admin-webapps-10.1.20-150200.5.22.2.noarch",
            "openSUSE Leap 15.5:tomcat10-docs-webapp-10.1.20-150200.5.22.2.noarch",
            "openSUSE Leap 15.5:tomcat10-el-5_0-api-10.1.20-150200.5.22.2.noarch",
            "openSUSE Leap 15.5:tomcat10-embed-10.1.20-150200.5.22.2.noarch",
            "openSUSE Leap 15.5:tomcat10-jsp-3_1-api-10.1.20-150200.5.22.2.noarch",
            "openSUSE Leap 15.5:tomcat10-jsvc-10.1.20-150200.5.22.2.noarch",
            "openSUSE Leap 15.5:tomcat10-lib-10.1.20-150200.5.22.2.noarch",
            "openSUSE Leap 15.5:tomcat10-servlet-6_0-api-10.1.20-150200.5.22.2.noarch",
            "openSUSE Leap 15.5:tomcat10-webapps-10.1.20-150200.5.22.2.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-04-11T10:43:42Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-23672"
    },
    {
      "cve": "CVE-2024-24549",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-24549"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Denial of Service due to improper input validation vulnerability for HTTP/2 requests in Apache Tomcat. When processing an HTTP/2 request, if the request exceeded any of the configured limits for headers, the associated HTTP/2 stream was not reset until after all of the headers had been processed.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M16, from 10.1.0-M1 through 10.1.18, from 9.0.0-M1 through 9.0.85, from 8.5.0 through 8.5.98.\n\nUsers are recommended to upgrade to version 11.0.0-M17, 10.1.19, 9.0.86 or 8.5.99 which fix the issue.\n\n",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-10.1.20-150200.5.22.2.noarch",
          "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-admin-webapps-10.1.20-150200.5.22.2.noarch",
          "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-el-5_0-api-10.1.20-150200.5.22.2.noarch",
          "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-jsp-3_1-api-10.1.20-150200.5.22.2.noarch",
          "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-lib-10.1.20-150200.5.22.2.noarch",
          "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-servlet-6_0-api-10.1.20-150200.5.22.2.noarch",
          "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-webapps-10.1.20-150200.5.22.2.noarch",
          "openSUSE Leap 15.5:tomcat10-10.1.20-150200.5.22.2.noarch",
          "openSUSE Leap 15.5:tomcat10-admin-webapps-10.1.20-150200.5.22.2.noarch",
          "openSUSE Leap 15.5:tomcat10-docs-webapp-10.1.20-150200.5.22.2.noarch",
          "openSUSE Leap 15.5:tomcat10-el-5_0-api-10.1.20-150200.5.22.2.noarch",
          "openSUSE Leap 15.5:tomcat10-embed-10.1.20-150200.5.22.2.noarch",
          "openSUSE Leap 15.5:tomcat10-jsp-3_1-api-10.1.20-150200.5.22.2.noarch",
          "openSUSE Leap 15.5:tomcat10-jsvc-10.1.20-150200.5.22.2.noarch",
          "openSUSE Leap 15.5:tomcat10-lib-10.1.20-150200.5.22.2.noarch",
          "openSUSE Leap 15.5:tomcat10-servlet-6_0-api-10.1.20-150200.5.22.2.noarch",
          "openSUSE Leap 15.5:tomcat10-webapps-10.1.20-150200.5.22.2.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-24549",
          "url": "https://www.suse.com/security/cve/CVE-2024-24549"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1221386 for CVE-2024-24549",
          "url": "https://bugzilla.suse.com/1221386"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-10.1.20-150200.5.22.2.noarch",
            "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-admin-webapps-10.1.20-150200.5.22.2.noarch",
            "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-el-5_0-api-10.1.20-150200.5.22.2.noarch",
            "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-jsp-3_1-api-10.1.20-150200.5.22.2.noarch",
            "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-lib-10.1.20-150200.5.22.2.noarch",
            "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-servlet-6_0-api-10.1.20-150200.5.22.2.noarch",
            "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-webapps-10.1.20-150200.5.22.2.noarch",
            "openSUSE Leap 15.5:tomcat10-10.1.20-150200.5.22.2.noarch",
            "openSUSE Leap 15.5:tomcat10-admin-webapps-10.1.20-150200.5.22.2.noarch",
            "openSUSE Leap 15.5:tomcat10-docs-webapp-10.1.20-150200.5.22.2.noarch",
            "openSUSE Leap 15.5:tomcat10-el-5_0-api-10.1.20-150200.5.22.2.noarch",
            "openSUSE Leap 15.5:tomcat10-embed-10.1.20-150200.5.22.2.noarch",
            "openSUSE Leap 15.5:tomcat10-jsp-3_1-api-10.1.20-150200.5.22.2.noarch",
            "openSUSE Leap 15.5:tomcat10-jsvc-10.1.20-150200.5.22.2.noarch",
            "openSUSE Leap 15.5:tomcat10-lib-10.1.20-150200.5.22.2.noarch",
            "openSUSE Leap 15.5:tomcat10-servlet-6_0-api-10.1.20-150200.5.22.2.noarch",
            "openSUSE Leap 15.5:tomcat10-webapps-10.1.20-150200.5.22.2.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-10.1.20-150200.5.22.2.noarch",
            "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-admin-webapps-10.1.20-150200.5.22.2.noarch",
            "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-el-5_0-api-10.1.20-150200.5.22.2.noarch",
            "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-jsp-3_1-api-10.1.20-150200.5.22.2.noarch",
            "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-lib-10.1.20-150200.5.22.2.noarch",
            "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-servlet-6_0-api-10.1.20-150200.5.22.2.noarch",
            "SUSE Linux Enterprise Module for Web and Scripting 15 SP5:tomcat10-webapps-10.1.20-150200.5.22.2.noarch",
            "openSUSE Leap 15.5:tomcat10-10.1.20-150200.5.22.2.noarch",
            "openSUSE Leap 15.5:tomcat10-admin-webapps-10.1.20-150200.5.22.2.noarch",
            "openSUSE Leap 15.5:tomcat10-docs-webapp-10.1.20-150200.5.22.2.noarch",
            "openSUSE Leap 15.5:tomcat10-el-5_0-api-10.1.20-150200.5.22.2.noarch",
            "openSUSE Leap 15.5:tomcat10-embed-10.1.20-150200.5.22.2.noarch",
            "openSUSE Leap 15.5:tomcat10-jsp-3_1-api-10.1.20-150200.5.22.2.noarch",
            "openSUSE Leap 15.5:tomcat10-jsvc-10.1.20-150200.5.22.2.noarch",
            "openSUSE Leap 15.5:tomcat10-lib-10.1.20-150200.5.22.2.noarch",
            "openSUSE Leap 15.5:tomcat10-servlet-6_0-api-10.1.20-150200.5.22.2.noarch",
            "openSUSE Leap 15.5:tomcat10-webapps-10.1.20-150200.5.22.2.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-04-11T10:43:42Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-24549"
    }
  ]
}
  Loading…
      Loading…
      Sightings
| Author | Source | Type | Date | 
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
      Loading…