<div class="container">
<h1>Security update for tomcat11</h1>
<table class="table table-striped table-bordered">
<tbody>
<tr>
<th>Announcement ID:</th>
<td>SUSE-SU-2025:02992-1</td>
</tr>
<tr>
<th>Release Date:</th>
<td>2025-08-27T11:57:17Z</td>
</tr>
<tr>
<th>Rating:</th>
<td>important</td>
</tr>
<tr>
<th>References:</th>
<td>
<ul>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1243895">bsc#1243895</a>
</li>
</ul>
</td>
</tr>
<tr>
<th>
Cross-References:
</th>
<td>
<ul>
<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-48989.html">CVE-2025-48989</a>
</li>
</ul>
</td>
</tr>
<tr>
<th>CVSS scores:</th>
<td>
<ul class="list-group">
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-48989</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">8.7</span>
<span class="cvss-vector">CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-48989</span>
<span class="cvss-source">
(
SUSE
):
</span>
<span class="cvss-score">7.5</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>
<li class="list-group-item">
<span class="cvss-reference">CVE-2025-48989</span>
<span class="cvss-source">
(
NVD
):
</span>
<span class="cvss-score">7.5</span>
<span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>
</ul>
</td>
</tr>
<tr>
<th>Affected Products:</th>
<td>
<ul class="list-group">
<li class="list-group-item">openSUSE Leap 15.6</li>
<li class="list-group-item">SUSE Linux Enterprise Server 15 SP6</li>
<li class="list-group-item">SUSE Linux Enterprise Server 15 SP7</li>
<li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP6</li>
<li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP7</li>
<li class="list-group-item">Web and Scripting Module 15-SP6</li>
<li class="list-group-item">Web and Scripting Module 15-SP7</li>
</ul>
</td>
</tr>
</tbody>
</table>
<p>An update that solves one vulnerability can now be installed.</p>
<h2>Description:</h2>
<p>This update for tomcat11 fixes the following issues:</p>
<p>Updated to Tomcat 11.0.10
- CVE-2025-48989: Fixed "MadeYouReset" DoS in HTTP/2 due to client triggered stream reset (bsc#1243895)</p>
<p>Other fixes:
* Catalina
+ Fix: Fix bloom filter population for archive indexing when using a
packed WAR containing one or more JAR files. (markt)
* Coyote
+ Fix: 69748: Add missing call to set keep-alive timeout when using
HTTP/1.1 following an async request, which was present for AJP.
(remm/markt)
+ Fix: 69762: Fix possible overflow during HPACK decoding of integers.
Note that the maximum permitted value of an HPACK decoded integer is
Integer.MAX_VALUE. (markt)
+ Fix: Update the HTTP/2 overhead documentation - particularly the code
comments - to reflect the deprecation of the PRIORITY frame and
clarify that a stream reset always triggers an overhead increase.
(markt)
* Cluster
+ Update: Add enableStatistics configuration attribute for the
DeltaManager, defaulting to true. (remm)
* WebSocket
+ Fix: Align the WebSocket extension handling for WebSocket client
connections with WebSocket server connections. The WebSocket client
now only includes an extension requested by an endpoint in the
opening handshake if the WebSocket client supports that extension.
(markt)
* Web applications
+ Fix: Manager and Host Manager. Provide the Manager and Host Manager
web applications with a dedicated favicon file rather than using the
one from the ROOT web application which might not be present or may
represent something entirely different. Pull requests #876 and #878
by Simon Arame.
* Other
+ Update: Update Checkstyle to 10.26.1. (markt)
+ Add: Improvements to French translations. (remm)
+ Add: Improvements to Japanese translations by tak7iji. (markt)</p>
<h2>Patch Instructions:</h2>
<p>
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".<br/>
Alternatively you can run the command listed for your product:
</p>
<ul class="list-group">
<li class="list-group-item">
Web and Scripting Module 15-SP7
<br/>
<code>zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP7-2025-2992=1</code>
</li>
<li class="list-group-item">
openSUSE Leap 15.6
<br/>
<code>zypper in -t patch SUSE-2025-2992=1 openSUSE-SLE-15.6-2025-2992=1</code>
</li>
<li class="list-group-item">
Web and Scripting Module 15-SP6
<br/>
<code>zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP6-2025-2992=1</code>
</li>
</ul>
<h2>Package List:</h2>
<ul>
<li>
Web and Scripting Module 15-SP7 (noarch)
<ul>
<li>tomcat11-el-6_0-api-11.0.10-150600.13.9.1</li>
<li>tomcat11-servlet-6_1-api-11.0.10-150600.13.9.1</li>
<li>tomcat11-webapps-11.0.10-150600.13.9.1</li>
<li>tomcat11-11.0.10-150600.13.9.1</li>
<li>tomcat11-jsp-4_0-api-11.0.10-150600.13.9.1</li>
<li>tomcat11-admin-webapps-11.0.10-150600.13.9.1</li>
<li>tomcat11-lib-11.0.10-150600.13.9.1</li>
</ul>
</li>
<li>
openSUSE Leap 15.6 (noarch)
<ul>
<li>tomcat11-el-6_0-api-11.0.10-150600.13.9.1</li>
<li>tomcat11-embed-11.0.10-150600.13.9.1</li>
<li>tomcat11-doc-11.0.10-150600.13.9.1</li>
<li>tomcat11-servlet-6_1-api-11.0.10-150600.13.9.1</li>
<li>tomcat11-docs-webapp-11.0.10-150600.13.9.1</li>
<li>tomcat11-webapps-11.0.10-150600.13.9.1</li>
<li>tomcat11-11.0.10-150600.13.9.1</li>
<li>tomcat11-jsp-4_0-api-11.0.10-150600.13.9.1</li>
<li>tomcat11-admin-webapps-11.0.10-150600.13.9.1</li>
<li>tomcat11-lib-11.0.10-150600.13.9.1</li>
<li>tomcat11-jsvc-11.0.10-150600.13.9.1</li>
</ul>
</li>
<li>
Web and Scripting Module 15-SP6 (noarch)
<ul>
<li>tomcat11-el-6_0-api-11.0.10-150600.13.9.1</li>
<li>tomcat11-servlet-6_1-api-11.0.10-150600.13.9.1</li>
<li>tomcat11-webapps-11.0.10-150600.13.9.1</li>
<li>tomcat11-11.0.10-150600.13.9.1</li>
<li>tomcat11-jsp-4_0-api-11.0.10-150600.13.9.1</li>
<li>tomcat11-admin-webapps-11.0.10-150600.13.9.1</li>
<li>tomcat11-lib-11.0.10-150600.13.9.1</li>
</ul>
</li>
</ul>
<h2>References:</h2>
<ul>
<li>
<a href="https://www.suse.com/security/cve/CVE-2025-48989.html">https://www.suse.com/security/cve/CVE-2025-48989.html</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1243895">https://bugzilla.suse.com/show_bug.cgi?id=1243895</a>
</li>
</ul>
</div>