<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for tomcat</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2017:1292-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2017-05-15T13:25:25Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2017-05-15T13:25:25Z</InitialReleaseDate>
    <CurrentReleaseDate>2017-05-15T13:25:25Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for tomcat</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for tomcat fixes the following issues:

   - CVE-2017-5647 Pipelined requests could lead to information disclosure (bsc#1033448)
   - CVE-2017-5648 Untrusted application could retain listener leading to information disclosure (bsc#1033447)
   - CVE-2016-8745 shared Processor on Connector code could lead to information disclosure (bsc#1015119)

This update was imported from the SUSE:SLE-12-SP1:Update and SUSE:SLE-12-SP2:Update update projects.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00037.html</URL>
      <Description>E-Mail link for openSUSE-SU-2017:1292-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.1">
      <Branch Type="Product Name" Name="openSUSE Leap 42.1">
        <FullProductName ProductID="openSUSE Leap 42.1">openSUSE Leap 42.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 42.2">
      <Branch Type="Product Name" Name="openSUSE Leap 42.2">
        <FullProductName ProductID="openSUSE Leap 42.2">openSUSE Leap 42.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="tomcat-8.0.43-6.7.1">
      <FullProductName ProductID="tomcat-8.0.43-6.7.1">tomcat-8.0.43-6.7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tomcat-admin-webapps-8.0.43-6.7.1">
      <FullProductName ProductID="tomcat-admin-webapps-8.0.43-6.7.1">tomcat-admin-webapps-8.0.43-6.7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tomcat-docs-webapp-8.0.43-6.7.1">
      <FullProductName ProductID="tomcat-docs-webapp-8.0.43-6.7.1">tomcat-docs-webapp-8.0.43-6.7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tomcat-el-3_0-api-8.0.43-6.7.1">
      <FullProductName ProductID="tomcat-el-3_0-api-8.0.43-6.7.1">tomcat-el-3_0-api-8.0.43-6.7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tomcat-embed-8.0.43-6.7.1">
      <FullProductName ProductID="tomcat-embed-8.0.43-6.7.1">tomcat-embed-8.0.43-6.7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tomcat-javadoc-8.0.43-6.7.1">
      <FullProductName ProductID="tomcat-javadoc-8.0.43-6.7.1">tomcat-javadoc-8.0.43-6.7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tomcat-jsp-2_3-api-8.0.43-6.7.1">
      <FullProductName ProductID="tomcat-jsp-2_3-api-8.0.43-6.7.1">tomcat-jsp-2_3-api-8.0.43-6.7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tomcat-jsvc-8.0.43-6.7.1">
      <FullProductName ProductID="tomcat-jsvc-8.0.43-6.7.1">tomcat-jsvc-8.0.43-6.7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tomcat-lib-8.0.43-6.7.1">
      <FullProductName ProductID="tomcat-lib-8.0.43-6.7.1">tomcat-lib-8.0.43-6.7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tomcat-servlet-3_1-api-8.0.43-6.7.1">
      <FullProductName ProductID="tomcat-servlet-3_1-api-8.0.43-6.7.1">tomcat-servlet-3_1-api-8.0.43-6.7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tomcat-webapps-8.0.43-6.7.1">
      <FullProductName ProductID="tomcat-webapps-8.0.43-6.7.1">tomcat-webapps-8.0.43-6.7.1</FullProductName>
    </Branch>
    <Relationship ProductReference="tomcat-8.0.43-6.7.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:tomcat-8.0.43-6.7.1">tomcat-8.0.43-6.7.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat-admin-webapps-8.0.43-6.7.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:tomcat-admin-webapps-8.0.43-6.7.1">tomcat-admin-webapps-8.0.43-6.7.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat-docs-webapp-8.0.43-6.7.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:tomcat-docs-webapp-8.0.43-6.7.1">tomcat-docs-webapp-8.0.43-6.7.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat-el-3_0-api-8.0.43-6.7.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:tomcat-el-3_0-api-8.0.43-6.7.1">tomcat-el-3_0-api-8.0.43-6.7.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat-embed-8.0.43-6.7.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:tomcat-embed-8.0.43-6.7.1">tomcat-embed-8.0.43-6.7.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat-javadoc-8.0.43-6.7.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:tomcat-javadoc-8.0.43-6.7.1">tomcat-javadoc-8.0.43-6.7.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat-jsp-2_3-api-8.0.43-6.7.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:tomcat-jsp-2_3-api-8.0.43-6.7.1">tomcat-jsp-2_3-api-8.0.43-6.7.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat-jsvc-8.0.43-6.7.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:tomcat-jsvc-8.0.43-6.7.1">tomcat-jsvc-8.0.43-6.7.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat-lib-8.0.43-6.7.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:tomcat-lib-8.0.43-6.7.1">tomcat-lib-8.0.43-6.7.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat-servlet-3_1-api-8.0.43-6.7.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:tomcat-servlet-3_1-api-8.0.43-6.7.1">tomcat-servlet-3_1-api-8.0.43-6.7.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat-webapps-8.0.43-6.7.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:tomcat-webapps-8.0.43-6.7.1">tomcat-webapps-8.0.43-6.7.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat-8.0.43-6.7.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:tomcat-8.0.43-6.7.1">tomcat-8.0.43-6.7.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat-admin-webapps-8.0.43-6.7.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:tomcat-admin-webapps-8.0.43-6.7.1">tomcat-admin-webapps-8.0.43-6.7.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat-docs-webapp-8.0.43-6.7.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:tomcat-docs-webapp-8.0.43-6.7.1">tomcat-docs-webapp-8.0.43-6.7.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat-el-3_0-api-8.0.43-6.7.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:tomcat-el-3_0-api-8.0.43-6.7.1">tomcat-el-3_0-api-8.0.43-6.7.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat-embed-8.0.43-6.7.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:tomcat-embed-8.0.43-6.7.1">tomcat-embed-8.0.43-6.7.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat-javadoc-8.0.43-6.7.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:tomcat-javadoc-8.0.43-6.7.1">tomcat-javadoc-8.0.43-6.7.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat-jsp-2_3-api-8.0.43-6.7.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:tomcat-jsp-2_3-api-8.0.43-6.7.1">tomcat-jsp-2_3-api-8.0.43-6.7.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat-jsvc-8.0.43-6.7.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:tomcat-jsvc-8.0.43-6.7.1">tomcat-jsvc-8.0.43-6.7.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat-lib-8.0.43-6.7.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:tomcat-lib-8.0.43-6.7.1">tomcat-lib-8.0.43-6.7.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat-servlet-3_1-api-8.0.43-6.7.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:tomcat-servlet-3_1-api-8.0.43-6.7.1">tomcat-servlet-3_1-api-8.0.43-6.7.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat-webapps-8.0.43-6.7.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:tomcat-webapps-8.0.43-6.7.1">tomcat-webapps-8.0.43-6.7.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A bug in the error handling of the send file code for the NIO HTTP connector in Apache Tomcat 9.0.0.M1 to 9.0.0.M13, 8.5.0 to 8.5.8, 8.0.0.RC1 to 8.0.39, 7.0.0 to 7.0.73 and 6.0.16 to 6.0.48 resulted in the current Processor object being added to the Processor cache multiple times. This in turn meant that the same Processor could be used for concurrent requests. Sharing a Processor can result in information leakage between requests including, not not limited to, session ID and the response body. The bug was first noticed in 8.5.x onwards where it appears the refactoring of the Connector code for 8.5.x onwards made it more likely that the bug was observed. Initially it was thought that the 8.5.x refactoring introduced the bug but further investigation has shown that the bug is present in all currently supported Tomcat versions.</Note>
    </Notes>
    <CVE>CVE-2016-8745</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:tomcat-8.0.43-6.7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tomcat-admin-webapps-8.0.43-6.7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tomcat-docs-webapp-8.0.43-6.7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tomcat-el-3_0-api-8.0.43-6.7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tomcat-embed-8.0.43-6.7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tomcat-javadoc-8.0.43-6.7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tomcat-jsp-2_3-api-8.0.43-6.7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tomcat-jsvc-8.0.43-6.7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tomcat-lib-8.0.43-6.7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tomcat-servlet-3_1-api-8.0.43-6.7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tomcat-webapps-8.0.43-6.7.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tomcat-8.0.43-6.7.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tomcat-admin-webapps-8.0.43-6.7.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tomcat-docs-webapp-8.0.43-6.7.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tomcat-el-3_0-api-8.0.43-6.7.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tomcat-embed-8.0.43-6.7.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tomcat-javadoc-8.0.43-6.7.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tomcat-jsp-2_3-api-8.0.43-6.7.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tomcat-jsvc-8.0.43-6.7.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tomcat-lib-8.0.43-6.7.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tomcat-servlet-3_1-api-8.0.43-6.7.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tomcat-webapps-8.0.43-6.7.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.6</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00037.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8745.html</URL>
        <Description>CVE-2016-8745</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015119</URL>
        <Description>SUSE Bug 1015119</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A bug in the handling of the pipelined requests in Apache Tomcat 9.0.0.M1 to 9.0.0.M18, 8.5.0 to 8.5.12, 8.0.0.RC1 to 8.0.42, 7.0.0 to 7.0.76, and 6.0.0 to 6.0.52, when send file was used, results in the pipelined request being lost when send file processing of the previous request completed. This could result in responses appearing to be sent for the wrong request. For example, a user agent that sent requests A, B and C could see the correct response for request A, the response for request C for request B and no response for request C.</Note>
    </Notes>
    <CVE>CVE-2017-5647</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:tomcat-8.0.43-6.7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tomcat-admin-webapps-8.0.43-6.7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tomcat-docs-webapp-8.0.43-6.7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tomcat-el-3_0-api-8.0.43-6.7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tomcat-embed-8.0.43-6.7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tomcat-javadoc-8.0.43-6.7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tomcat-jsp-2_3-api-8.0.43-6.7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tomcat-jsvc-8.0.43-6.7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tomcat-lib-8.0.43-6.7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tomcat-servlet-3_1-api-8.0.43-6.7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tomcat-webapps-8.0.43-6.7.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tomcat-8.0.43-6.7.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tomcat-admin-webapps-8.0.43-6.7.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tomcat-docs-webapp-8.0.43-6.7.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tomcat-el-3_0-api-8.0.43-6.7.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tomcat-embed-8.0.43-6.7.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tomcat-javadoc-8.0.43-6.7.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tomcat-jsp-2_3-api-8.0.43-6.7.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tomcat-jsvc-8.0.43-6.7.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tomcat-lib-8.0.43-6.7.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tomcat-servlet-3_1-api-8.0.43-6.7.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tomcat-webapps-8.0.43-6.7.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.9</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00037.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5647.html</URL>
        <Description>CVE-2017-5647</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1033448</URL>
        <Description>SUSE Bug 1033448</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1036642</URL>
        <Description>SUSE Bug 1036642</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">While investigating bug 60718, it was noticed that some calls to application listeners in Apache Tomcat 9.0.0.M1 to 9.0.0.M17, 8.5.0 to 8.5.11, 8.0.0.RC1 to 8.0.41, and 7.0.0 to 7.0.75 did not use the appropriate facade object. When running an untrusted application under a SecurityManager, it was therefore possible for that untrusted application to retain a reference to the request or response object and thereby access and/or modify information associated with another web application.</Note>
    </Notes>
    <CVE>CVE-2017-5648</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:tomcat-8.0.43-6.7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tomcat-admin-webapps-8.0.43-6.7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tomcat-docs-webapp-8.0.43-6.7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tomcat-el-3_0-api-8.0.43-6.7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tomcat-embed-8.0.43-6.7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tomcat-javadoc-8.0.43-6.7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tomcat-jsp-2_3-api-8.0.43-6.7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tomcat-jsvc-8.0.43-6.7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tomcat-lib-8.0.43-6.7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tomcat-servlet-3_1-api-8.0.43-6.7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:tomcat-webapps-8.0.43-6.7.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tomcat-8.0.43-6.7.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tomcat-admin-webapps-8.0.43-6.7.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tomcat-docs-webapp-8.0.43-6.7.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tomcat-el-3_0-api-8.0.43-6.7.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tomcat-embed-8.0.43-6.7.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tomcat-javadoc-8.0.43-6.7.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tomcat-jsp-2_3-api-8.0.43-6.7.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tomcat-jsvc-8.0.43-6.7.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tomcat-lib-8.0.43-6.7.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tomcat-servlet-3_1-api-8.0.43-6.7.1</ProductID>
        <ProductID>openSUSE Leap 42.2:tomcat-webapps-8.0.43-6.7.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.5</BaseScore>
        <Vector>AV:L/AC:M/Au:S/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-05/msg00037.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5648.html</URL>
        <Description>CVE-2017-5648</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1033447</URL>
        <Description>SUSE Bug 1033447</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
