SUSE-SU-2025:02992-1: important: Security update for tomcat11
SLE-SECURITY-UPDATES
null at suse.de
Wed Aug 27 12:30:19 UTC 2025
# Security update for tomcat11
Announcement ID: SUSE-SU-2025:02992-1
Release Date: 2025-08-27T11:57:17Z
Rating: important
References:
* bsc#1243895
Cross-References:
* CVE-2025-48989
CVSS scores:
* CVE-2025-48989 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-48989 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-48989 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
* Web and Scripting Module 15-SP6
* Web and Scripting Module 15-SP7
An update that solves one vulnerability can now be installed.
## Description:
This update for tomcat11 fixes the following issues:
Updated to Tomcat 11.0.10 \- CVE-2025-48989: Fixed "MadeYouReset" DoS in HTTP/2
due to client triggered stream reset (bsc#1243895)
Other fixes: * Catalina \+ Fix: Fix bloom filter population for archive indexing
when using a packed WAR containing one or more JAR files. (markt) * Coyote \+
Fix: 69748: Add missing call to set keep-alive timeout when using HTTP/1.1
following an async request, which was present for AJP. (remm/markt) \+ Fix:
69762: Fix possible overflow during HPACK decoding of integers. Note that the
maximum permitted value of an HPACK decoded integer is Integer.MAX_VALUE.
(markt) \+ Fix: Update the HTTP/2 overhead documentation - particularly the code
comments - to reflect the deprecation of the PRIORITY frame and clarify that a
stream reset always triggers an overhead increase. (markt) * Cluster \+ Update:
Add enableStatistics configuration attribute for the DeltaManager, defaulting to
true. (remm) * WebSocket \+ Fix: Align the WebSocket extension handling for
WebSocket client connections with WebSocket server connections. The WebSocket
client now only includes an extension requested by an endpoint in the opening
handshake if the WebSocket client supports that extension. (markt) * Web
applications \+ Fix: Manager and Host Manager. Provide the Manager and Host
Manager web applications with a dedicated favicon file rather than using the one
from the ROOT web application which might not be present or may represent
something entirely different. Pull requests #876 and #878 by Simon Arame. *
Other \+ Update: Update Checkstyle to 10.26.1. (markt) \+ Add: Improvements to
French translations. (remm) \+ Add: Improvements to Japanese translations by
tak7iji. (markt)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* Web and Scripting Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP7-2025-2992=1
* openSUSE Leap 15.6
zypper in -t patch SUSE-2025-2992=1 openSUSE-SLE-15.6-2025-2992=1
* Web and Scripting Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP6-2025-2992=1
## Package List:
* Web and Scripting Module 15-SP7 (noarch)
* tomcat11-el-6_0-api-11.0.10-150600.13.9.1
* tomcat11-servlet-6_1-api-11.0.10-150600.13.9.1
* tomcat11-webapps-11.0.10-150600.13.9.1
* tomcat11-11.0.10-150600.13.9.1
* tomcat11-jsp-4_0-api-11.0.10-150600.13.9.1
* tomcat11-admin-webapps-11.0.10-150600.13.9.1
* tomcat11-lib-11.0.10-150600.13.9.1
* openSUSE Leap 15.6 (noarch)
* tomcat11-el-6_0-api-11.0.10-150600.13.9.1
* tomcat11-embed-11.0.10-150600.13.9.1
* tomcat11-doc-11.0.10-150600.13.9.1
* tomcat11-servlet-6_1-api-11.0.10-150600.13.9.1
* tomcat11-docs-webapp-11.0.10-150600.13.9.1
* tomcat11-webapps-11.0.10-150600.13.9.1
* tomcat11-11.0.10-150600.13.9.1
* tomcat11-jsp-4_0-api-11.0.10-150600.13.9.1
* tomcat11-admin-webapps-11.0.10-150600.13.9.1
* tomcat11-lib-11.0.10-150600.13.9.1
* tomcat11-jsvc-11.0.10-150600.13.9.1
* Web and Scripting Module 15-SP6 (noarch)
* tomcat11-el-6_0-api-11.0.10-150600.13.9.1
* tomcat11-servlet-6_1-api-11.0.10-150600.13.9.1
* tomcat11-webapps-11.0.10-150600.13.9.1
* tomcat11-11.0.10-150600.13.9.1
* tomcat11-jsp-4_0-api-11.0.10-150600.13.9.1
* tomcat11-admin-webapps-11.0.10-150600.13.9.1
* tomcat11-lib-11.0.10-150600.13.9.1
## References:
* https://www.suse.com/security/cve/CVE-2025-48989.html
* https://bugzilla.suse.com/show_bug.cgi?id=1243895
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-security-updates/attachments/20250827/4ea52c9c/attachment.htm>
More information about the sle-security-updates
mailing list