<div class="container">
<h1>Security update for tomcat10</h1>
<table class="table table-striped table-bordered">
<tbody>
<tr>
<th>Announcement ID:</th>
<td>SUSE-SU-2025:1024-1</td>
</tr>
<tr>
<th>Release Date:</th>
<td>2025-03-26T11:29:29Z</td>
</tr>
<tr>
<th>Rating:</th>
<td>important</td>
</tr>
<tr>
<th>References:</th>
<td>
<ul>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239302">bsc#1239302</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239676">bsc#1239676</a>
</li>
</ul>
</td>
</tr>
<tr>
<th>
Cross-References:
</th>
<td>
<ul>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56337.html">CVE-2024-56337</a>
</li>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-24813.html">CVE-2025-24813</a>
</li>
</ul>
</td>
</tr>
<tr>
<th>CVSS scores:</th>
<td>
<ul class="list-group">
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-56337</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">8.1</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2024-56337</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">9.8</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-24813</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">9.2</span>
<span class="cvss-vector">CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-24813</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">8.1</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-24813</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">9.8</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-24813</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">9.8</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
</li>
</ul>
</td>
</tr>
<tr>
<th>Affected Products:</th>
<td>
<ul class="list-group">
<li class="list-group-item">openSUSE Leap 15.6</li>
<li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15 SP5</li>
<li class="list-group-item">SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5</li>
<li class="list-group-item">SUSE Linux Enterprise High Performance Computing LTSS 15 SP5</li>
<li class="list-group-item">SUSE Linux Enterprise Server 15 SP5</li>
<li class="list-group-item">SUSE Linux Enterprise Server 15 SP5 LTSS</li>
<li class="list-group-item">SUSE Linux Enterprise Server 15 SP6</li>
<li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP5</li>
<li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP6</li>
<li class="list-group-item">Web and Scripting Module 15-SP6</li>
</ul>
</td>
</tr>
</tbody>
</table>
<p>An update that solves two vulnerabilities can now be installed.</p>
<h2>Description:</h2>
<p>This update for tomcat10 fixes the following issues:</p>
<ul>
<li>CVE-2025-24813: Fixed potential RCE and/or information disclosure/corruption with
partial PUT (bsc#1239302)</li>
</ul>
<p>Other fixes:</p>
<ul>
<li>Update to Tomcat 10.1.39</li>
<li>Fixes:<ul>
<li>launch with java 17 (bsc#1239676)</li>
</ul>
</li>
<li>Catalina<ul>
<li>Fix: 69602: Fix regression in releases from 12-2024 that were too strict
and rejected weak etags in the If-Range header with a 400 response.
Instead will consider it as a failed match since strong etags are required
for If-Range. (remm)</li>
<li>Fix: When looking up class loader resources by resource name, the resource
name should not start with '/'. If the resource name does start with '/',
Tomcat is lenient and looks it up as if the '/' was not present. When the
web application class loader was configured with external repositories and
names starting with '/' were used for lookups, it was possible that cached
'not found' results could effectively hide lookup results using the
correct resource name. (markt)</li>
<li>Fix: Enable the JNDIRealm to validate credentials provided to
HttpServletRequest.login(String username, String password) when the realm
is configured to use GSSAPI authentication. (markt)</li>
<li>Fix: Fix a bug in the JRE compatibility detection that incorrectly
identified Java 19 and Java 20 as supporting Java 21 features. (markt)</li>
<li>Fix: Improve the checks for exposure to and protection against
CVE-2024-56337 so that reflection is not used unless required. The checks
for whether the file system is case sensitive or not have been removed.
(markt)</li>
<li>Add: Add support for logging the connection ID (as returned by
ServletRequest.getServletConnection().getConnectionId()) with the
AccessLogValve and ExtendedAccessLogValve. Based on pull request #814 by
Dmole. (markt)</li>
<li>Fix: Avoid scenarios where temporary files used for partial PUT would not
be deleted. (remm)</li>
<li>Fix: 69576: Avoid possible failure initializing JreCompat due to uncaught
exception introduced for the check for CVE-2024-56337. (remm)</li>
</ul>
</li>
<li>Cluster<ul>
<li>Add: 69598: Add detection of service account token changes to the
KubernetesMembershipProvider implementation and reload the token if it
changes. Based on a patch by Miroslav Jezbera. (markt)</li>
</ul>
</li>
<li>Coyote<ul>
<li>Fix: 69575: Avoid using compression if a response is already compressed
using compress, deflate or zstd. (remm)</li>
<li>Update: Use Transfer-Encoding for compression rather than Content-Encoding
if the client submits a TE header containing gzip. (remm)</li>
<li>Fix: Fix a race condition in the handling of HTTP/2 stream reset that
could cause unexpected 500 responses. (markt)</li>
</ul>
</li>
<li>
<p>Other</p>
<ul>
<li>Add: Add makensis as an option for building the Installer for Windows on
non-Windows platforms. (rjung/markt)</li>
<li>Update: Update Byte Buddy to 1.17.1. (markt)</li>
<li>Update: Update Checkstyle to 10.21.3. (markt)</li>
<li>Update: Update SpotBugs to 4.9.1. (markt)</li>
<li>Update: Update JSign to 7.1. (markt)</li>
<li>Add: Improvements to French translations. (remm)</li>
<li>Add: Improvements to Japanese translations by tak7iji. (markt)</li>
<li>Add: Add org.apache.juli.JsonFormatter to format log as one line JSON
documents. (remm) </li>
</ul>
</li>
<li>
<p>Update to Tomcat 10.1.35</p>
</li>
<li>Catalina<ul>
<li>Update: Add tableName configuration on the DataSourcePropertyStore that
may be used by the WebDAV Servlet. (remm)</li>
<li>Update: Improve HTTP If headers processing according to RFC 9110. Based on
pull request #796 by Chenjp. (remm/markt)</li>
<li>Update: Allow readOnly attribute configuration on the Resources element
and allow configure the readOnly attribute value of the main resources.
The attribute value will also be used by the default and WebDAV Servlets.
(remm)</li>
<li>Fix: 69285: Optimise the creation of the parameter map for included
requests. Based on sample code and test cases provided by John
Engebretson. (markt)</li>
<li>Fix: 69527: Avoid rare cases where a cached resource could be set with 0
content length, or could be evicted immediately. (remm)</li>
<li>Fix: Fix possible edge cases (such as HTTP/1.0) with trying to detect
requests without body for WebDAV LOCK and PROPFIND. (remm)</li>
<li>Fix: 69528: Add multi-release JAR support for the bloom
archiveIndexStrategy of the Resources. (remm)</li>
<li>Fix: Improve checks for WEB-INF and META-INF in the WebDAV servlet. Based
on a patch submitted by Chenjp. (remm)</li>
<li>Fix: Remove unused session to client map from CrawlerSessionManagerValve.
Submitted by Brian Matzon. (remm)</li>
<li>Add: Add a check to ensure that, if one or more web applications are
potentially vulnerable to CVE-2024-56337, the JVM has been configured to
protect against the vulnerability and to configure the JVM correctly if
not. Where one or more web applications are potentially vulnerable to
CVE-2024-56337 and the JVM cannot be correctly configured or it cannot be
confirmed that the JVM has been correctly configured, prevent the impacted
web applications from starting. (markt)</li>
<li>Fix: When using the WebDAV servlet with serveSubpathOnly set to true,
ensure that the destination for any requested WebDAV operation is also
restricted to the sub-path. (markt)</li>
<li>Fix: Generate an appropriate Allow HTTP header when the Default servlet
returns a 405 (method not allowed) response in response to a DELETE
request because the target resource cannot be deleted. Pull request #802
provided by Chenjp. (markt)</li>
<li>Code: Refactor creation of RequestDispatcher instances so that the
processing of the provided path is consistent with normal request
processing. (markt)</li>
<li>Add: Add encodedReverseSolidusHandling and encodedSolidusHandling
attributes to Context to provide control over the handling of the path
used to created a RequestDispatcher. (markt)</li>
<li>Fix: Handle a potential NullPointerException after an IOException occurs
on a non-container thread during asynchronous processing. (markt)</li>
<li>Fix: Enhance lifecycle of temporary files used by partial PUT. (remm)</li>
</ul>
</li>
<li>Coyote<ul>
<li>Fix: Don't log warnings for registered HTTP/2 settings that Tomcat does
not support. These settings are now silently ignored. (markt)</li>
<li>Fix: Avoid a rare NullPointerException when recycling the
Http11InputBuffer. (markt)</li>
<li>Fix: Lower the log level to debug for logging an invalid socket channel
when processing poller events for the NIO Connector as this may occur in
normal usage. (markt)</li>
<li>Code: Clean-up references to the HTTP/2 stream once request processing has
completed to aid GC and reduce the size of the HTTP/2 recycled request and
response cache. (markt)</li>
<li>Add: Add a new Connector configuration attribute,
encodedReverseSolidusHandling, to control how %5c sequences in URLs are
handled. The default behaviour is unchanged (decode) keeping in mind that
the allowBackslash attribute determines how the decoded URI is processed.
(markt)</li>
<li>Fix: 69545: Improve CRLF skipping for the available method of the
ChunkedInputFilter. (remm)</li>
<li>Fix: Improve the performance of repeated calls to getHeader(). Pull
request #813 provided by Adwait Kumar Singh. (markt)</li>
<li>Fix: 69559: Ensure that the Java 24 warning regarding the use of
sun.misc.Unsafe::invokeCleaner is only reported by the JRE when the code
will be used. (markt)</li>
</ul>
</li>
<li>Jasper<ul>
<li>Fix: 69508: Correct a regression in the fix for 69382 that broke JSP
include actions if both the page attribute and the body contained
parameters. Pull request #803 provided by Chenjp. (markt)</li>
<li>Fix: Update the identifier validation in the Expression Language parser to
reflect that, as of Java 9, _ is also a Java keyword and may not be used
as an identifier. (markt)</li>
<li>Fix: 69521: Update the EL Parser to allow the full range of valid
characters in an EL identifier as defined by the Java Language
Specification. (markt)</li>
<li>Fix: 69532: Optimise the creation of ExpressionFactory instances. Patch
provided by John Engebretson. (markt)</li>
</ul>
</li>
<li>Web applications<ul>
<li>Add: Documentation. Expand the description of the security implications of
setting mapperContextRootRedirectEnabled and/or
mapperDirectoryRedirectEnabled to true. (markt)</li>
<li>Fix: Documentation. Better document the default for the truststoreProvider
attribute of a SSLHostConfig element. (markt)</li>
</ul>
</li>
<li>Other<ul>
<li>Update: Update to Commons Daemon 1.4.1. (markt)</li>
<li>Update: Update the packaged version of the Tomcat Migration Tool for
Jakarta EE to 1.0.9. (markt)</li>
<li>Update: Update the internal fork of Commons Pool to 2.12.1. (markt)</li>
<li>Update: Update Byte Buddy to 1.16.1. (markt)</li>
<li>Update: Update UnboundID to 7.0.2. (markt)</li>
<li>Update: Update Checkstyle to 10.21.2. (markt)</li>
<li>Update: Update SpotBugs to 4.9.0. (markt)</li>
<li>Add: Improvements to French translations. (remm)</li>
<li>Add: Improvements to Chinese translations by leeyazhou. (markt)</li>
<li>Add: Improvements to Japanese translations by tak7iji. (markt) </li>
<li>Add: Improvements to Japanese translations by tak7iji. (markt)</li>
</ul>
</li>
</ul>
<h2>Patch Instructions:</h2>
<p>
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".<br/>
Alternatively you can run the command listed for your product:
</p>
<ul class="list-group">
<li class="list-group-item">
openSUSE Leap 15.6
<br/>
<code>zypper in -t patch openSUSE-SLE-15.6-2025-1024=1</code>
</li>
<li class="list-group-item">
Web and Scripting Module 15-SP6
<br/>
<code>zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP6-2025-1024=1</code>
</li>
<li class="list-group-item">
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
<br/>
<code>zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1024=1</code>
</li>
<li class="list-group-item">
SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
<br/>
<code>zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1024=1</code>
</li>
<li class="list-group-item">
SUSE Linux Enterprise Server 15 SP5 LTSS
<br/>
<code>zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1024=1</code>
</li>
<li class="list-group-item">
SUSE Linux Enterprise Server for SAP Applications 15 SP5
<br/>
<code>zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1024=1</code>
</li>
</ul>
<h2>Package List:</h2>
<ul>
<li>
openSUSE Leap 15.6 (noarch)
<ul>
<li>tomcat10-el-5_0-api-10.1.39-150200.5.36.1</li>
<li>tomcat10-admin-webapps-10.1.39-150200.5.36.1</li>
<li>tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1</li>
<li>tomcat10-jsvc-10.1.39-150200.5.36.1</li>
<li>tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1</li>
<li>tomcat10-lib-10.1.39-150200.5.36.1</li>
<li>tomcat10-embed-10.1.39-150200.5.36.1</li>
<li>tomcat10-docs-webapp-10.1.39-150200.5.36.1</li>
<li>tomcat10-10.1.39-150200.5.36.1</li>
<li>tomcat10-doc-10.1.39-150200.5.36.1</li>
<li>tomcat10-webapps-10.1.39-150200.5.36.1</li>
</ul>
</li>
<li>
Web and Scripting Module 15-SP6 (noarch)
<ul>
<li>tomcat10-el-5_0-api-10.1.39-150200.5.36.1</li>
<li>tomcat10-admin-webapps-10.1.39-150200.5.36.1</li>
<li>tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1</li>
<li>tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1</li>
<li>tomcat10-lib-10.1.39-150200.5.36.1</li>
<li>tomcat10-10.1.39-150200.5.36.1</li>
<li>tomcat10-webapps-10.1.39-150200.5.36.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch)
<ul>
<li>tomcat10-el-5_0-api-10.1.39-150200.5.36.1</li>
<li>tomcat10-admin-webapps-10.1.39-150200.5.36.1</li>
<li>tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1</li>
<li>tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1</li>
<li>tomcat10-lib-10.1.39-150200.5.36.1</li>
<li>tomcat10-10.1.39-150200.5.36.1</li>
<li>tomcat10-webapps-10.1.39-150200.5.36.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch)
<ul>
<li>tomcat10-el-5_0-api-10.1.39-150200.5.36.1</li>
<li>tomcat10-admin-webapps-10.1.39-150200.5.36.1</li>
<li>tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1</li>
<li>tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1</li>
<li>tomcat10-lib-10.1.39-150200.5.36.1</li>
<li>tomcat10-10.1.39-150200.5.36.1</li>
<li>tomcat10-webapps-10.1.39-150200.5.36.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Server 15 SP5 LTSS (noarch)
<ul>
<li>tomcat10-el-5_0-api-10.1.39-150200.5.36.1</li>
<li>tomcat10-admin-webapps-10.1.39-150200.5.36.1</li>
<li>tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1</li>
<li>tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1</li>
<li>tomcat10-lib-10.1.39-150200.5.36.1</li>
<li>tomcat10-10.1.39-150200.5.36.1</li>
<li>tomcat10-webapps-10.1.39-150200.5.36.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch)
<ul>
<li>tomcat10-el-5_0-api-10.1.39-150200.5.36.1</li>
<li>tomcat10-admin-webapps-10.1.39-150200.5.36.1</li>
<li>tomcat10-jsp-3_1-api-10.1.39-150200.5.36.1</li>
<li>tomcat10-servlet-6_0-api-10.1.39-150200.5.36.1</li>
<li>tomcat10-lib-10.1.39-150200.5.36.1</li>
<li>tomcat10-10.1.39-150200.5.36.1</li>
<li>tomcat10-webapps-10.1.39-150200.5.36.1</li>
</ul>
</li>
</ul>
<h2>References:</h2>
<ul>
<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56337.html">https://www.suse.com/security/cve/CVE-2024-56337.html</a>
</li>
<li>
<a href="https://www.suse.com/security/cve/CVE-2025-24813.html">https://www.suse.com/security/cve/CVE-2025-24813.html</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239302">https://bugzilla.suse.com/show_bug.cgi?id=1239302</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239676">https://bugzilla.suse.com/show_bug.cgi?id=1239676</a>
</li>
</ul>
</div>