SUSE-SU-2025:0033-1: important: Security update for tomcat10
openSUSE-SU-2025:14618-1: moderate: apptainer-1.3.6-2.1 on GA media
openSUSE-SU-2025:14623-1: moderate: tomcat10-10.1.34-1.1 on GA media
openSUSE-SU-2025:14619-1: moderate: firefox-esr-128.6.0-1.1 on GA media
openSUSE-SU-2025:14621-1: moderate: libruby3_4-3_4-3.4.1-1.1 on GA media
openSUSE-SU-2025:14620-1: moderate: libopenjp2-7-2.5.3-2.1 on GA media
SUSE-SU-2025:0033-1: important: Security update for tomcat10
# Security update for tomcat10
Announcement ID: SUSE-SU-2025:0033-1
Release Date: 2025-01-07T22:47:30Z
Rating: important
References:
* bsc#1233435
* bsc#1234663
* bsc#1234664
Cross-References:
* CVE-2024-50379
* CVE-2024-52317
* CVE-2024-54677
CVSS scores:
* CVE-2024-50379 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50379 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50379 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-52317 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2024-52317 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2024-52317 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2024-54677 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-54677 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-54677 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Affected Products:
* openSUSE Leap 15.6
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* Web and Scripting Module 15-SP6
An update that solves three vulnerabilities can now be installed.
## Description:
This update for tomcat10 fixes the following issues:
Update to Tomcat 10.1.34
* Fixed CVEs:
* CVE-2024-54677: DoS in examples web application (bsc#1234664)
* CVE-2024-50379: RCE due to TOCTOU issue in JSP compilation (bsc#1234663)
* CVE-2024-52317: Request/response mix-up with HTTP/2 (bsc#1233435)
* Catalina
* Add: Add option to serve resources from subpath only with WebDAV Servlet
like with DefaultServlet. (michaelo)
* Fix: Add special handling for the protocols attribute of SSLHostConfig in
storeconfig. (remm)
* Fix: 69442: Fix case sensitive check on content-type when parsing request
parameters. (remm)
* Code: Refactor duplicate code for extracting media type and subtype from
content-type into a single method. (markt)
* Fix: Compatibility of generated embedded code with components where
constructors or property related methods throw a checked exception. (remm)
* Fix: The previous fix for inconsistent resource metadata during concurrent
reads and writes was incomplete. (markt)
* Fix: #780: Fix content-range header length. Submitted by Chenjp. (remm)
* Fix: 69444: Ensure that the jakarta.servlet.error.message request attribute
is set when an application defined error page is called. (markt)
* Fix: Avoid quotes for numeric values in the JSON generated by the status
servlet. (remm)
* Add: Add strong ETag support for the WebDAV and default servlet, which can
be enabled by using the useStrongETags init parameter with a value set to
true. The ETag generated will be a SHA-1 checksum of the resource content.
(remm)
* Fix: Use client locale for directory listings. (remm)
* Fix: 69439: Improve the handling of multiple Cache-Control headers in the
ExpiresFilter. Based on pull request #777 by Chenjp. (markt)
* Fix: 69447: Update the support for caching classes the web application class
loader cannot find to take account of classes loaded from external
repositories. Prior to this fix, these classes could be incorrectly marked
as not found. (markt)
* Fix: 69466: Rework handling of HEAD requests. Headers explicitly set by
users will not be removed and any header present in a HEAD request will also
be present in the equivalent GET request. There may be some headers, as per
RFC 9110, section 9.3.2, that are present in a GET request that are not
present in the equivalent HEAD request. (markt)
* Fix: 69471: Log instances of CloseNowException caught by
ApplicationDispatcher.invoke() at debug level rather than error level as
they are very likely to have been caused by a client disconnection or
similar I/O issue. (markt)
* Add: Add a test case for the fix for 69442. Also refactor references to
application/x-www-form-urlencoded. Based on pull request #779 by Chenjp.
(markt)
* Fix: 69476: Catch possible ISE when trying to report PUT failure in the
DefaultServlet. (remm)
* Add: Add support for RateLimit header fields for HTTP (draft) in the
RateLimitFilter. Based on pull request #775 provided by Chenjp. (markt)
* Add: #787: Add regression tests for 69478. Pull request provided by Thomas
Krisch. (markt)
* Fix: The default servlet now rejects HTTP range requests when two or more of
the requested ranges overlap. Based on pull request #782 provided by Chenjp.
(markt)
* Fix: Enhance Content-Range verification for partial PUT requests handled by
the default servlet. Provided by Chenjp in pull request #778. (markt)
* Fix: Harmonize DataSourceStore lookup in the global resources to optionally
avoid the comp/env prefix which is usually not used there. (remm)
* Fix: As required by RFC 9110, the HTTP Range header will now only be
processed for GET requests. Based on pull request #790 provided by Chenjp.
(markt)
* Fix: Deprecate the useAcceptRanges initialisation parameter for the default
servlet. It will be removed in Tomcat 12 onwards where it will effectively
be hard coded to true. (markt)
* Add: Add DataSource based property storage for the WebdavServlet. (remm)
* Coyote
* Fix: Align encodedSolidusHandling with the Servlet specification. If the
pass-through mode is used, any %25 sequences will now also be passed through
to avoid errors and/or corruption when the application decodes the path.
(markt)
* Jasper
* Fix: Follow-up to the fix for 69381. Apply the optimisation for method
lookup performance in expression language to an additional location. (markt)
* Web applications
* Fix: Documentation. Remove references to the ResourceParams element. Support
for ResourceParams was removed in Tomcat 5.5.x. (markt)
* Fix: Documentation. 69477: Correct name of attribute for RemoteIPFilter. The
attribute is internalProxies rather than allowedInternalProxies. Pull
request #786 (markt)
* Fix: Examples. Fix broken links when Servlet Request Info example is called
via a URL that includes a pathInfo component. (markt)
* Fix: Examples. Expand the obfuscation of session cookie values in the
request header example to JSON responses. (markt)
* Add: Examples. Add the ability to delete session attributes in the servlet
session example. (markt)
* Add: Examples. Add a hard coded limit of 10 attributes per session for the
servlet session example. (markt)
* Add: Examples. Add the ability to delete session attributes and add a hard
coded limit of 10 attributes per session for the JSP form authentication
example. (markt)
* Add: Examples. Limit the shopping cart example to only allow adding the pre-
defined items to the cart. (markt)
* Fix: Examples. Remove JSP calendar example. (markt)
* Other
* Fix: 69465: Fix warnings during native image compilation using the Tomcat
embedded JARs. (markt)
* Update: Update Tomcat's fork of Commons DBCP to 2.13.0. (markt)
* Update: Update EasyMock to 5.5.0. (markt)
* Update: Update Checkstyle to 10.20.2. (markt)
* Update: Update BND to 7.1.0. (markt)
* Add: Improvements to French translations. (remm)
* Add: Improvements to Korean translations. (markt)
* Add: Improvements to Chinese translations. (markt)
* Add: Improvements to Japanese translations by tak7iji. (markt)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2025-33=1
* Web and Scripting Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP6-2025-33=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-33=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-33=1
* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-33=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-33=1
## Package List:
* openSUSE Leap 15.6 (noarch)
* tomcat10-el-5_0-api-10.1.34-150200.5.31.1
* tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1
* tomcat10-webapps-10.1.34-150200.5.31.1
* tomcat10-doc-10.1.34-150200.5.31.1
* tomcat10-admin-webapps-10.1.34-150200.5.31.1
* tomcat10-docs-webapp-10.1.34-150200.5.31.1
* tomcat10-10.1.34-150200.5.31.1
* tomcat10-embed-10.1.34-150200.5.31.1
* tomcat10-lib-10.1.34-150200.5.31.1
* tomcat10-jsvc-10.1.34-150200.5.31.1
* tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1
* Web and Scripting Module 15-SP6 (noarch)
* tomcat10-el-5_0-api-10.1.34-150200.5.31.1
* tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1
* tomcat10-webapps-10.1.34-150200.5.31.1
* tomcat10-admin-webapps-10.1.34-150200.5.31.1
* tomcat10-10.1.34-150200.5.31.1
* tomcat10-lib-10.1.34-150200.5.31.1
* tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch)
* tomcat10-el-5_0-api-10.1.34-150200.5.31.1
* tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1
* tomcat10-webapps-10.1.34-150200.5.31.1
* tomcat10-admin-webapps-10.1.34-150200.5.31.1
* tomcat10-10.1.34-150200.5.31.1
* tomcat10-lib-10.1.34-150200.5.31.1
* tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch)
* tomcat10-el-5_0-api-10.1.34-150200.5.31.1
* tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1
* tomcat10-webapps-10.1.34-150200.5.31.1
* tomcat10-admin-webapps-10.1.34-150200.5.31.1
* tomcat10-10.1.34-150200.5.31.1
* tomcat10-lib-10.1.34-150200.5.31.1
* tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (noarch)
* tomcat10-el-5_0-api-10.1.34-150200.5.31.1
* tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1
* tomcat10-webapps-10.1.34-150200.5.31.1
* tomcat10-admin-webapps-10.1.34-150200.5.31.1
* tomcat10-10.1.34-150200.5.31.1
* tomcat10-lib-10.1.34-150200.5.31.1
* tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch)
* tomcat10-el-5_0-api-10.1.34-150200.5.31.1
* tomcat10-jsp-3_1-api-10.1.34-150200.5.31.1
* tomcat10-webapps-10.1.34-150200.5.31.1
* tomcat10-admin-webapps-10.1.34-150200.5.31.1
* tomcat10-10.1.34-150200.5.31.1
* tomcat10-lib-10.1.34-150200.5.31.1
* tomcat10-servlet-6_0-api-10.1.34-150200.5.31.1
## References:
* https://www.suse.com/security/cve/CVE-2024-50379.html
* https://www.suse.com/security/cve/CVE-2024-52317.html
* https://www.suse.com/security/cve/CVE-2024-54677.html
* https://bugzilla.suse.com/show_bug.cgi?id=1233435
* https://bugzilla.suse.com/show_bug.cgi?id=1234663
* https://bugzilla.suse.com/show_bug.cgi?id=1234664
openSUSE-SU-2025:14618-1: moderate: apptainer-1.3.6-2.1 on GA media
# apptainer-1.3.6-2.1 on GA media
Announcement ID: openSUSE-SU-2025:14618-1
Rating: moderate
Cross-References:
* CVE-2024-28180
CVSS scores:
* CVE-2024-28180 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-28180 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the apptainer-1.3.6-2.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* apptainer 1.3.6-2.1
* apptainer-leap 1.3.6-2.1
* apptainer-sle15_5 1.3.6-2.1
* apptainer-sle15_6 1.3.6-2.1
* apptainer-sle15_7 1.3.6-2.1
## References:
* https://www.suse.com/security/cve/CVE-2024-28180.html
openSUSE-SU-2025:14623-1: moderate: tomcat10-10.1.34-1.1 on GA media
# tomcat10-10.1.34-1.1 on GA media
Announcement ID: openSUSE-SU-2025:14623-1
Rating: moderate
Cross-References:
* CVE-2024-50379
* CVE-2024-54677
CVSS scores:
* CVE-2024-50379 ( SUSE ): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50379 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-54677 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-54677 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves 2 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the tomcat10-10.1.34-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* tomcat10 10.1.34-1.1
* tomcat10-admin-webapps 10.1.34-1.1
* tomcat10-doc 10.1.34-1.1
* tomcat10-docs-webapp 10.1.34-1.1
* tomcat10-el-5_0-api 10.1.34-1.1
* tomcat10-embed 10.1.34-1.1
* tomcat10-jsp-3_1-api 10.1.34-1.1
* tomcat10-jsvc 10.1.34-1.1
* tomcat10-lib 10.1.34-1.1
* tomcat10-servlet-6_0-api 10.1.34-1.1
* tomcat10-webapps 10.1.34-1.1
## References:
* https://www.suse.com/security/cve/CVE-2024-50379.html
* https://www.suse.com/security/cve/CVE-2024-54677.html
openSUSE-SU-2025:14619-1: moderate: firefox-esr-128.6.0-1.1 on GA media
# firefox-esr-128.6.0-1.1 on GA media
Announcement ID: openSUSE-SU-2025:14619-1
Rating: moderate
Cross-References:
* CVE-2025-0237
* CVE-2025-0238
* CVE-2025-0239
* CVE-2025-0240
* CVE-2025-0241
* CVE-2025-0242
* CVE-2025-0243
Affected Products:
* openSUSE Tumbleweed
An update that solves 7 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the firefox-esr-128.6.0-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* firefox-esr 128.6.0-1.1
* firefox-esr-branding-upstream 128.6.0-1.1
* firefox-esr-translations-common 128.6.0-1.1
* firefox-esr-translations-other 128.6.0-1.1
## References:
* https://www.suse.com/security/cve/CVE-2025-0237.html
* https://www.suse.com/security/cve/CVE-2025-0238.html
* https://www.suse.com/security/cve/CVE-2025-0239.html
* https://www.suse.com/security/cve/CVE-2025-0240.html
* https://www.suse.com/security/cve/CVE-2025-0241.html
* https://www.suse.com/security/cve/CVE-2025-0242.html
* https://www.suse.com/security/cve/CVE-2025-0243.html
openSUSE-SU-2025:14621-1: moderate: libruby3_4-3_4-3.4.1-1.1 on GA media
# libruby3_4-3_4-3.4.1-1.1 on GA media
Announcement ID: openSUSE-SU-2025:14621-1
Rating: moderate
Cross-References:
* CVE-2020-10663
* CVE-2020-10933
* CVE-2021-28965
* CVE-2021-31799
* CVE-2021-31810
* CVE-2021-32066
* CVE-2021-41816
* CVE-2021-41817
* CVE-2021-41819
* CVE-2022-28738
* CVE-2022-28739
* CVE-2023-28755
CVSS scores:
* CVE-2020-10663 ( SUSE ): 8 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
* CVE-2020-10933 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2021-28965 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2021-31799 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-31810 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2021-32066 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
* CVE-2021-41817 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-41819 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2022-28739 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2023-28755 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Affected Products:
* openSUSE Tumbleweed
An update that solves 12 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the libruby3_4-3_4-3.4.1-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* libruby3_4-3_4 3.4.1-1.1
* ruby3.4 3.4.1-1.1
* ruby3.4-devel 3.4.1-1.1
* ruby3.4-devel-extra 3.4.1-1.1
* ruby3.4-doc 3.4.1-1.1
* ruby3.4-doc-ri 3.4.1-1.1
## References:
* https://www.suse.com/security/cve/CVE-2020-10663.html
* https://www.suse.com/security/cve/CVE-2020-10933.html
* https://www.suse.com/security/cve/CVE-2021-28965.html
* https://www.suse.com/security/cve/CVE-2021-31799.html
* https://www.suse.com/security/cve/CVE-2021-31810.html
* https://www.suse.com/security/cve/CVE-2021-32066.html
* https://www.suse.com/security/cve/CVE-2021-41816.html
* https://www.suse.com/security/cve/CVE-2021-41817.html
* https://www.suse.com/security/cve/CVE-2021-41819.html
* https://www.suse.com/security/cve/CVE-2022-28738.html
* https://www.suse.com/security/cve/CVE-2022-28739.html
* https://www.suse.com/security/cve/CVE-2023-28755.html
openSUSE-SU-2025:14620-1: moderate: libopenjp2-7-2.5.3-2.1 on GA media
# libopenjp2-7-2.5.3-2.1 on GA media
Announcement ID: openSUSE-SU-2025:14620-1
Rating: moderate
Cross-References:
* CVE-2024-56826
CVSS scores:
* CVE-2024-56826 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56826 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the libopenjp2-7-2.5.3-2.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* libopenjp2-7 2.5.3-2.1
* libopenjp2-7-32bit 2.5.3-2.1
* libopenjp2-7-x86-64-v3 2.5.3-2.1
* openjpeg2 2.5.3-2.1
* openjpeg2-devel 2.5.3-2.1
* openjpeg2-devel-doc 2.5.3-2.1
## References:
* https://www.suse.com/security/cve/CVE-2024-56826.html