openSUSE Security Update: tomcat ______________________________________________________________________________ Announcement ID: openSUSE-SU-2013:1307-1 Rating: moderate References: #768772 #804992 #822177 #831117 #831119 Cross-References: CVE-2013-1976 CVE-2013-2067 CVE-2013-3544 Affected Products: openSUSE 12.2 ______________________________________________________________________________ An update that solves three vulnerabilities and has two fixes is now available. Description: Tomcat was updated to fix security issues and bug: CVE-2013-1976: Avoid a potential symlink race during startup of the tomcat server, where a local attacker that gaine access to the tomcat chroot could escalate privileges to root. CVE-2013-2067: java/org/apache/catalina/authenticator/FormAuthenticator.jav a in the form authentication feature in Apache Tomcat did not properly handle the relationships between authentication requirements and sessions, which allows remote attackers to inject a request into a session by sending this request during completion of the login form, a variant of a session fixation attack. CVE-2013-3544: Tomcat were affected by a chunked transfer encoding extension size denial of service vulnerability. Also the following bug was fixed: - Fix tomcat init scripts generating malformed classpath (http://youtrack.jetbrains.com/issue/JT-18545) bnc#804992 Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 12.2: zypper in -t patch openSUSE-2013-633 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE 12.2 (noarch): tomcat-7.0.27-2.19.1 tomcat-admin-webapps-7.0.27-2.19.1 tomcat-docs-webapp-7.0.27-2.19.1 tomcat-el-2_2-api-7.0.27-2.19.1 tomcat-javadoc-7.0.27-2.19.1 tomcat-jsp-2_2-api-7.0.27-2.19.1 tomcat-jsvc-7.0.27-2.19.1 tomcat-lib-7.0.27-2.19.1 tomcat-servlet-3_0-api-7.0.27-2.19.1 tomcat-webapps-7.0.27-2.19.1 References: http://support.novell.com/security/cve/CVE-2013-1976.html http://support.novell.com/security/cve/CVE-2013-2067.html http://support.novell.com/security/cve/CVE-2013-3544.html https://bugzilla.novell.com/768772 https://bugzilla.novell.com/804992 https://bugzilla.novell.com/822177 https://bugzilla.novell.com/831117 https://bugzilla.novell.com/831119