<div class="container">
<h1>Security update for tomcat10</h1>
<table class="table table-striped table-bordered">
<tbody>
<tr>
<th>Announcement ID:</th>
<td>SUSE-SU-2024:4105-1</td>
</tr>
<tr>
<th>Release Date:</th>
<td>2024-11-28T15:09:20Z</td>
</tr>
<tr>
<th>Rating:</th>
<td>critical</td>
</tr>
<tr>
<th>References:</th>
<td>
<ul>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233434">bsc#1233434</a>
</li>
</ul>
</td>
</tr>
<tr>
<th>
Cross-References:
</th>
<td>
<ul>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-52316.html">CVE-2024-52316</a>
</li>
</ul>
</td>
</tr>
<tr>
<th>CVSS scores:</th>
<td>
<ul class="list-group">
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-52316</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">10.0</span>
<span class="cvss-vector">CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-52316</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">9.8</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-52316</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">9.8</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
</li>
</ul>
</td>
</tr>
<tr>
<th>Affected Products:</th>
<td>
<ul class="list-group">
<li class="list-group-item">openSUSE Leap 15.5</li>
<li class="list-group-item">openSUSE Leap 15.6</li>
<li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15 SP5</li>
<li class="list-group-item">SUSE Linux Enterprise Server 15 SP5</li>
<li class="list-group-item">SUSE Linux Enterprise Server 15 SP6</li>
<li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP5</li>
<li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP6</li>
<li class="list-group-item">Web and Scripting Module 15-SP5</li>
<li class="list-group-item">Web and Scripting Module 15-SP6</li>
</ul>
</td>
</tr>
</tbody>
</table>
<p>An update that solves one vulnerability can now be installed.</p>
<h2>Description:</h2>
<p>This update for tomcat10 fixes the following issues:</p>
<ul>
<li>Update to Tomcat 10.1.33</li>
<li>Fixed CVEs:<ul>
<li>CVE-2024-52316: If the Jakarta Authentication fails with an exception,
set a 500 status (bsc#1233434)</li>
</ul>
</li>
<li>Catalina<ul>
<li>Add: Add support for the new Servlet API method HttpServletResponse.sendEarlyHints(). (markt)</li>
<li>Add: 55470: Add debug logging that reports the class path when a
ClassNotFoundException occurs in the digester or the web application class loader.
Based on a patch by Ralf Hauser. (markt)</li>
<li>Update: 69374: Properly separate between table header and body in
DefaultServlet's listing. (michaelo)</li>
<li>Update: 69373: Make DefaultServlet's HTML listing file last modified
rendering better (flexible). (michaelo)</li>
<li>Update: Improve HTML output of DefaultServlet. (michaelo)</li>
<li>Code: Refactor RateLimitFilter to use FilterBase as the base class.
The primary advantage is less code to process init-param values. (markt)</li>
<li>Update: 69370: DefaultServlet's HTML listing uses incorrect labels.
(michaelo)</li>
<li>Fix: Avoid NPE in CrawlerSessionManagerValve for partially mapped requests. (remm)</li>
<li>Fix: Add missing WebDAV Lock-Token header in the response when locking
a folder. (remm)</li>
<li>Fix: Invalid WebDAV lock requests should be rejected with 400. (remm)</li>
<li>Fix: Fix regression in WebDAV when attempting to unlock a collection. (remm)</li>
<li>Fix: Verify that destination is not locked for a WebDAV copy operation. (remm)</li>
<li>Fix: Send 415 response to WebDAV MKCOL operations that include a request
body since this is optional and unsupported. (remm)</li>
<li>Fix: Enforce DAV: namespace on WebDAV XML elements. (remm)</li>
<li>Fix: Do not allow a new WebDAV lock on a child resource if a parent
collection is locked (RFC 4918 section 6.1). (remm)</li>
<li>Fix: WebDAV DELETE should remove any existing lock on successfully
deleted resources. (remm)</li>
<li>Update: Remove WebDAV lock null support in accordance with RFC 4918
section 7.3 and annex D. Instead, a lock on a non-existing resource will
create an empty file locked with a regular lock. (remm)</li>
<li>Update: Rewrite implementation of WebDAV shared locks to comply with
RFC 4918. (remm)</li>
<li>Update: Implement WebDAV If header using code from the Apache Jackrabbit
project. (remm)</li>
<li>Add: Add PropertyStore interface in the WebDAV Servlet, to allow
implementation of dead properties storage. The store used can be configured
using the propertyStore init parameter of the WebDAV servlet by specifying
the class name of the store. A simple non-persistent implementation is
used if no custom store is configured. (remm)</li>
<li>Update: Implement WebDAV PROPPATCH method using the newly added
PropertyStore, and update PROPFIND to support it. (remm)</li>
<li>Fix: Cache not found results when searching for web application class
loader resources. This addresses performance problems caused by components
such as java.sql.DriverManager, which in some circumstances will search
for the same class repeatedly. The size of the cache can be controlled
via the new notFoundClassResourceCacheSize on the StandardContext. (markt)</li>
<li>Fix: Stop after INITIALIZED state should be a noop since it is possible
for subcomponents to be in FAILED after init. (remm)</li>
<li>Fix: Fix incorrect web resource cache size calculations when there are
concurrent PUT and DELETE requests for the same resource. (markt)</li>
<li>Add: Add debug logging for the web resource cache so the current size
can be tracked as resources are added and removed. (markt)</li>
<li>Update: Replace legacy WebDAV opaquelocktoken: scheme for lock tokens
with urn:uuid: as recommended by RFC 4918, and remove secret init
parameter. (remm)</li>
<li>Fix: Concurrent reads and writes (e.g. GET and PUT / DELETE) for the
same path caused corruption of the FileResource where some of the fields
were set as if the file exists and some as set as if it does not. This
resulted in inconsistent metadata. (markt)</li>
<li>Fix: 69415: Ensure that the ExpiresFilter only sets cache headers on
GET and HEAD requests. Also, skip requests where the application has
set Cache-Control: no-store. (markt)</li>
<li>Fix: 69419: Improve the performance of ServletRequest.getAttribute()
when there are multiple levels of nested includes. Based on a patch
provided by John Engebretson. (markt)</li>
<li>Add: All applications to send an early hints informational response
by calling HttpServletResponse.sendError() with a status code of 103.
(schultz)</li>
<li>Fix: Ensure that ServerAuthModule.initialize() is called when a
Jakarta Authentication module is configured via registerServerAuthModule().
(markt)</li>
<li>Fix: Ensure that the Jakarta Authentication CallbackHandler only creates
one GenericPrincipal in the Subject. (markt)</li>
<li>Fix: If the Jakarta Authentication process fails with an Exception,
explicitly set the HTTP response status to 500 as the ServerAuthContext
may not have set it. (markt)</li>
<li>Fix: When persisting the Jakarta Authentication provider configuration,
create any necessary parent directories that don't already exist. (markt)</li>
<li>Fix: Correct the logic used to detect errors when deleting temporary files
associated with persisting the Jakarta Authentication provider
configuration. (markt)</li>
<li>Fix: When processing Jakarta Authentication callbacks, don't overwrite
a Principal obtained from the PasswordValidationCallback with null if the
CallerPrincipalCallback does not provide a Principal. (markt)</li>
<li>Fix: Avoid store config backup loss when storing one configuration more
than once per second. (remm)</li>
<li>Fix: 69359: WebdavServlet duplicates getRelativePath() method from
super class with incorrect Javadoc. (michaelo)</li>
<li>Fix: 69360: Inconsistent DELETE behavior between WebdavServlet and
DefaultServlet. (michaelo)</li>
<li>Fix: Make WebdavServlet properly return the Allow header when deletion
of a resource is not allowed. (michaelo)</li>
<li>Fix: Add log warning if non-wildcard mappings are used with the WebdavServlet.
(remm)</li>
<li>Fix: 69361: Ensure that the order of entries in a multi-status response
to a WebDAV is consistent with the order in which resources were processed.
(markt)</li>
<li>Fix: 69362: Provide a better multi-status response when deleting a
collection via WebDAV fails. Empty directories that cannot be deleted
will now be included in the response. (markt)</li>
<li>Fix: 69363: Use getPathPrefix() consistently in the WebDAV servlet to
ensure that the correct path is used when the WebDAV servlet is mounted
at a sub-path within the web application. (markt)</li>
<li>Fix 69320, a regression in the fix for 69302 that meant the HTTP/2 processing
was likely to be broken for all clients once any client sent an HTTP/2
reset frame. (markt)</li>
<li>Fix: Improve performance of ApplicationHttpRequest.parseParameters().
Based on sample code and test cases provided by John Engebretson. (markt)</li>
<li>Fix: Correct regressions in the refactoring that added recycling of the coyote
request and response to the HTTP/2 processing. (markt)</li>
<li>Add: Add support for RFC 8297 (Early Hints). Applications can use this
feature by casting the HttpServletResponse to org.apache.catalina.connector.
Response and then calling the method void sendEarlyHints(). This method
will be added to the Servlet API (removing the need for the cast) in Servlet
6.2 onwards. (markt)</li>
<li>Fix: 69214: Do not reject a CORS request that uses POST but does not include
a content-type header. Tomcat now correctly processes this as a simple CORS
request. Based on a patch suggested by thebluemountain. (markt)</li>
<li>Fix: Refactor SpnegoAuthenticator so it uses Subject.callAs() rather than
Subject.doAs() when available. (markt)</li>
<li>Fix: Allow JAASRealm to use the configuration source to load a configured
configFile, for easier use with testing. (remm)</li>
<li>Fix: Add missing algorithm callback to the JAASCallbackHandler. (remm)</li>
<li>Fix: Add the OpenSSL version number on the APR and OpenSSL status classes.
(remm)</li>
<li>Fix: 69131: Expand the implementation of the filter value of the Authenticator
attribute allowCorsPreflight, so that it applies to all requests that match
the configured URL patterns for the CORS filter, rather than only applying
if the CORS filter is mapped to /*. (markt)</li>
<li>Fix: Using the OpenSSLListener will now cause the connector to use OpenSSL
if available. (remm)</li>
</ul>
</li>
<li>Coyote<ul>
<li>Fix: Return null SSL session id on zero-length byte array returned
from the SSL implementation. (remm)</li>
<li>Fix: Skip OpenSSLConf with BoringSSL since it is unsupported. (remm)</li>
<li>Fix: Create the HttpParser in Http11Processor if it is not present on
the AbstractHttp11Protocol to provide better lifecycle robustness for
regular HTTP/1.1. The new behavior was introduced in a previous refactoring
to improve HTTP/2 performance. (remm)</li>
<li>Fix: OpenSSLContext will now throw a KeyManagementException if something
is known to have gone wrong in the init method, which is the behavior
documented by javax.net.ssl.SSLContext.init. This makes error handling
more consistent. (remm)</li>
<li>Fix: 69379: The default HEAD response no longer includes the payload
HTTP header fields as per section 9.3.2 of RFC 9110. (markt)</li>
<li>Fix: 69316: Ensure that FastHttpDateFormat#getCurrentDate() (used to
generate Date headers for HTTP responses) generates the correct string
for the given input. Prior to this change, the output may have been
wrong by one second in some cases. Pull request #751 provided by Chenjp.
(markt)</li>
<li>Fix: Request start time may not have been accurately recorded for HTTP/1.1
requests preceded by a large number of blank lines. (markt)</li>
<li>Add: Add server and serverRemoveAppProvidedValues to the list of attributes
the HTTP/2 protocol will inherit from the HTTP/1.1 connector it is nested
within. (markt)</li>
<li>Fix: Avoid possible crashes when using Apache Tomcat Native, caused by
destroying SSLContext objects through GC after APR has been terminated.
(remm)</li>
<li>Fix: Improve HTTP/2 handling of trailer fields for requests. Trailer fields
no longer need to be received before the headers of the subsequent stream,
nor are trailer fields for an in-progress stream swallowed if the Connector
is paused before the trailer fields are received. (markt)</li>
<li>Fix: Ensure the request and response are not recycled too soon for an
HTTP/2 stream when a stream-level error is detected during the processing
of incoming HTTP/2 frames. This could lead to incorrect processing times
appearing in the access log. (markt)</li>
<li>Fix: Correct a regression in the fix for non-blocking reads of chunked
request bodies that caused InputStream.available() to return a non-zero
value when there was no data to read. In some circumstances this could
cause a blocking read to block waiting for more data rather than return
the data it had already received. (markt)</li>
<li>Add: Add a new attribute cookiesWithoutEquals to the Rfc6265CookieProcessor.
The default behaviour is unchanged. (markt)</li>
<li>Fix: Ensure that Tomcat sends a TLS close_notify message after receiving
one from the client when using the OpenSSLImplementation. (markt)</li>
<li>Fix: 69301: Fix trailer headers replacing non-trailer headers when writing
response headers to the access log. Based on a patch and test case
provided by hypnoce. (markt)</li>
<li>Fix: 69302: If an HTTP/2 client resets a stream before the request body
is fully written, ensure that any ReadListener is notified via a call
to ReadListener.onError(). (markt)</li>
<li>Fix: Ensure that HTTP/2 stream input buffers are only created when there is
a request body to be read. (markt)</li>
<li>Code: Refactor creation of HttpParser instances from the Processor level to
the Protocol level since the parser configuration depends on the protocol
and the parser is, otherwise, stateless. (markt)</li>
<li>Add: Align HTTP/2 with HTTP/1.1 and recycle the container internal request
and response processing objects by default. This behaviour can be controlled
via the new discardRequestsAndResponses attribute on the HTTP/2 upgrade protocol.
(markt)</li>
<li>Fix: Clean and log OpenSSL errors before processing of OpenSSL conf commands
in the FFM code. (remm)</li>
<li>Fix: 69121: Ensure that the onComplete() event is triggered if AsyncListener.
onError() dispatches to a target that throws an exception. (markt)</li>
<li>Fix: Following the trailer header field refactoring, -1 is no longer an allowed
value for maxTrailerSize. Adjust documentation accordingly. (remm)</li>
<li>Update: Move OpenSSL support using FFM to a separate JAR named tomcat-coyote-ffm.
jar that advertises Java 22 in its manifest. (remm)</li>
<li>Fix: Fix search for OpenSSL library for FFM on Mac OS so that java.library.path
is searched. (markt)</li>
<li>Update: Add FFM compatibility methods for LibreSSL support. Renegotiation is
not supported at the moment. (remm)</li>
<li>Update: Add org.apache.tomcat.util.openssl.LIBRARY_NAME (specifies the name
of the library to load) and org.apache.tomcat.util.openssl.USE_SYSTEM_LOAD_LIBRARY
(set to true to use System.loadLibrary rather than the FFM library loading code)
to configure the OpenSSL library loading using FFM. (remm)</li>
<li>Update: Add FFM compatibility methods for BoringSSL support. Renegotiation is
not supported in many cases. (remm)</li>
</ul>
</li>
<li>Jasper<ul>
<li>Fix: Add back tag release method as deprecated in the runtime for
compatibility with old generated code. (remm)</li>
<li>Fix: 69399: Fix regression caused by improvement 69333, which caused
the tag release to be called when using tag pooling, and to be skipped
when not using it. Patch submitted by Michal Sobkiewicz. (remm)</li>
<li>Fix: 69381: Improve method lookup performance in expression language.
When the required method has no arguments, there is no need to consider
casting or coercion, and the method lookup process can be simplified.
Based on a pull request by John Engebretson. (markt)</li>
<li>Fix: 69382: Improve the performance of the JSP include action by re-using
results of relatively expensive method calls in the generated code rather
than repeating them. Patch provided by John Engebretson. (markt)</li>
<li>Fix: 69398: Avoid unnecessary object allocation in PageContextImpl.
Based on a suggestion by John Engebretson. (markt)</li>
<li>Fix: 69406: When using StringInterpreterEnum, do not throw an
IllegalArgumentException when an invalid Enum is encountered. Instead,
resolve the value at runtime. Patch provided by John Engebretson. (markt)</li>
<li>Fix: 69429: Optimize EL evaluation of method parameters for methods
that do not accept any parameters. Patch provided by John Engebretson. (markt)</li>
<li>Fix: Further optimize EL evaluation of method parameters. Patch provided
by Paolo B. (markt)</li>
<li>Fix: 69333: Remove unnecessary code from generated JSPs. (markt)</li>
<li>Fix: 69338: Improve the performance of processing expressions that include
AND or OR operations with more than two operands and expressions that use
not empty. (markt)</li>
<li>Fix: 69348: Reduce memory consumption in ELContext by using lazy
initialization for the data structure used to track lambda arguments. (markt)</li>
<li>Fix: Switch the TldScanner back to logging detailed scan results at debug
level rather than trace level. (markt)</li>
<li>Fix: Update the optimisation in jakarta.el.ImportHandler so it is aware of
new classes added to the java.lang package in Java 23. (markt)</li>
<li>Fix: Ensure that an exception in toString() still results in an ELException
when an object is coerced to a String using ExpressionFactory.coerceToType().
(markt)</li>
<li>Add: Add support for specifying Java 24 (with the value 24) as the compiler
source and/or compiler target for JSP compilation. If used with an Eclipse JDT
compiler version that does not support these values, a warning will be logged
and the default will be used. (markt)</li>
<li>Fix: 69135: When using include directives in a tag file packaged in a JAR file,
ensure that context relative includes are processed correctly. (markt)</li>
<li>Fix: 69135: When using include directives in a tag file packaged in a JAR file,
ensure that file relative includes are processed correctly. (markt)</li>
<li>Fix: 69135: When using include directives in a tag file packaged in a JAR file,
ensure that file relative includes are not permitted to access files outside
of the /META_INF/tags/ directory nor outside of the JAR file. (markt)</li>
</ul>
</li>
<li>WebSocket<ul>
<li>Fix: If a blocking message write exceeds the timeout, don't attempt the
write again before throwing the exception. (markt)</li>
<li>Fix: An EncodeException being thrown during a message write should not
automatically cause the connection to close. The application should handle
the exception and make the decision whether or not to close the connection.
(markt)</li>
</ul>
</li>
<li>Web applications<ul>
<li>Fix: The manager webapp will now be able to access certificates again
when OpenSSL is used. (remm)</li>
<li>Fix: Documentation. Align the logging configuration documentation with
the current defaults. (markt)</li>
<li>Fix: Fix status servlet detailed view of the connectors when using automatic
port. (remm)</li>
</ul>
</li>
<li>jdbc-pool<ul>
<li>Fix: 69255: Correct a regression in the fix for 69206 that meant exceptions
executing statements were wrapped in a java.lang.reflect.UndeclaredThrowableException
rather than the application seeing the original SQLException. Fixed by pull
request #744 provided by Michael Clarke. (markt)</li>
<li>Fix: 69279: Correct a regression in the fix for 69206 that meant that methods
that previously returned a null ResultSet were returning a proxy with a
null delegate. Fixed by pull request #745 provided by Huub de Beer. (markt)</li>
<li>Fix: 69206: Ensure statements returned from Statement methods executeQuery(),
getResultSet() and getGeneratedKeys() are correctly wrapped before being returned
to the caller. Based on pull request #742 provided by Michael Clarke. (markt)</li>
</ul>
</li>
<li>Other<ul>
<li>Update: Switch from DigiCert ONE to ssl.com eSigner for code signing. (markt)</li>
<li>Update: Update Byte Buddy to 1.15.10. (markt)</li>
<li>Update: Update CheckStyle to 10.20.0. (markt)</li>
<li>Add: Improvements to German translations. (remm)</li>
<li>Update: Update Byte Buddy to 1.15.3. (markt)</li>
<li>Update: Update CheckStyle to 10.18.2. (markt)</li>
<li>Add: Improvements to French translations. (remm)</li>
<li>Add: Improvements to Japanese translations by tak7iji. (markt)</li>
<li>Add: Improvements to Chinese translations by Ch_jp. (markt)</li>
<li>Add: Exclude the tomcat-coyote-ffm.jar from JAR scanning by default. (markt)</li>
<li>Fix: Change the default log handler level to ALL so log messages are not
dropped by default if a logger is configured to use trace (FINEST) level
logging. (markt)</li>
<li>Update: Update Hamcrest to 3.0. (markt)</li>
<li>Update: Update EasyMock to 5.4.0. (markt)</li>
<li>Update: Update Byte Buddy to 1.15.0. (markt)</li>
<li>Update: Update CheckStyle to 10.18.0. (markt)</li>
<li>Update: Update the internal fork of Apache Commons BCEL to 6.10.0. (markt)</li>
<li>Add: Improvements to Spanish translations by Fernando. (markt)</li>
<li>Add: Improvements to French translations. (remm)</li>
<li>Add: Improvements to Japanese translations by tak7iji. (markt)</li>
<li>Fix: Fix packaging regression with missing osgi information following addition
of the test-only build target. (remm)</li>
<li>Update: Update Tomcat Native to 2.0.8. (markt)</li>
<li>Update: Update Byte Buddy to 1.14.18. (markt)</li>
<li>Add: Improvements to French translations. (remm)</li>
<li>Add: Improvements to Japanese translations by tak7iji. (markt)</li>
<li>Update: Add test-only build target to allow running only the testsuite,
supporting Java versions down to the minimum supported to run Tomcat. (rjung)</li>
<li>Update: Update UnboundID to 7.0.1. (markt)</li>
<li>Update: Update to SpotBugs 4.8.6. (markt)</li>
<li>Update: Remove cglib dependency as it is not required by the version of EasyMock
used by the unit tests. (markt)</li>
<li>Update: Update EasyMock to 5.3.0. This adds a test dependency on Byte-Buddy
1.14.17. (markt)</li>
<li>Add: Improvements to Czech translations by VladimĂr Chlup. (markt)</li>
<li>Add: Improvements to French translations. (remm)</li>
<li>Add: Improvements to Japanese translations by tak7iji. (markt)</li>
<li>Add: Improvements to Chinese translations by fangzheng. (markt)</li>
</ul>
</li>
</ul>
<h2>Patch Instructions:</h2>
<p>
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".<br/>
Alternatively you can run the command listed for your product:
</p>
<ul class="list-group">
<li class="list-group-item">
openSUSE Leap 15.5
<br/>
<code>zypper in -t patch openSUSE-SLE-15.5-2024-4105=1</code>
</li>
<li class="list-group-item">
openSUSE Leap 15.6
<br/>
<code>zypper in -t patch openSUSE-SLE-15.6-2024-4105=1</code>
</li>
<li class="list-group-item">
Web and Scripting Module 15-SP5
<br/>
<code>zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP5-2024-4105=1</code>
</li>
<li class="list-group-item">
Web and Scripting Module 15-SP6
<br/>
<code>zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP6-2024-4105=1</code>
</li>
</ul>
<h2>Package List:</h2>
<ul>
<li>
openSUSE Leap 15.5 (noarch)
<ul>
<li>tomcat10-docs-webapp-10.1.33-150200.5.28.1</li>
<li>tomcat10-lib-10.1.33-150200.5.28.1</li>
<li>tomcat10-jsvc-10.1.33-150200.5.28.1</li>
<li>tomcat10-jsp-3_1-api-10.1.33-150200.5.28.1</li>
<li>tomcat10-el-5_0-api-10.1.33-150200.5.28.1</li>
<li>tomcat10-servlet-6_0-api-10.1.33-150200.5.28.1</li>
<li>tomcat10-10.1.33-150200.5.28.1</li>
<li>tomcat10-webapps-10.1.33-150200.5.28.1</li>
<li>tomcat10-admin-webapps-10.1.33-150200.5.28.1</li>
<li>tomcat10-embed-10.1.33-150200.5.28.1</li>
</ul>
</li>
<li>
openSUSE Leap 15.6 (noarch)
<ul>
<li>tomcat10-docs-webapp-10.1.33-150200.5.28.1</li>
<li>tomcat10-lib-10.1.33-150200.5.28.1</li>
<li>tomcat10-doc-10.1.33-150200.5.28.1</li>
<li>tomcat10-jsvc-10.1.33-150200.5.28.1</li>
<li>tomcat10-jsp-3_1-api-10.1.33-150200.5.28.1</li>
<li>tomcat10-el-5_0-api-10.1.33-150200.5.28.1</li>
<li>tomcat10-servlet-6_0-api-10.1.33-150200.5.28.1</li>
<li>tomcat10-10.1.33-150200.5.28.1</li>
<li>tomcat10-webapps-10.1.33-150200.5.28.1</li>
<li>tomcat10-admin-webapps-10.1.33-150200.5.28.1</li>
<li>tomcat10-embed-10.1.33-150200.5.28.1</li>
</ul>
</li>
<li>
Web and Scripting Module 15-SP5 (noarch)
<ul>
<li>tomcat10-lib-10.1.33-150200.5.28.1</li>
<li>tomcat10-jsp-3_1-api-10.1.33-150200.5.28.1</li>
<li>tomcat10-el-5_0-api-10.1.33-150200.5.28.1</li>
<li>tomcat10-servlet-6_0-api-10.1.33-150200.5.28.1</li>
<li>tomcat10-10.1.33-150200.5.28.1</li>
<li>tomcat10-webapps-10.1.33-150200.5.28.1</li>
<li>tomcat10-admin-webapps-10.1.33-150200.5.28.1</li>
</ul>
</li>
<li>
Web and Scripting Module 15-SP6 (noarch)
<ul>
<li>tomcat10-lib-10.1.33-150200.5.28.1</li>
<li>tomcat10-jsp-3_1-api-10.1.33-150200.5.28.1</li>
<li>tomcat10-el-5_0-api-10.1.33-150200.5.28.1</li>
<li>tomcat10-servlet-6_0-api-10.1.33-150200.5.28.1</li>
<li>tomcat10-10.1.33-150200.5.28.1</li>
<li>tomcat10-webapps-10.1.33-150200.5.28.1</li>
<li>tomcat10-admin-webapps-10.1.33-150200.5.28.1</li>
</ul>
</li>
</ul>
<h2>References:</h2>
<ul>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-52316.html">https://www.suse.com/security/cve/CVE-2024-52316.html</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233434">https://bugzilla.suse.com/show_bug.cgi?id=1233434</a>
</li>
</ul>
</div>