<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for tomcat6</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2015:1565-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2015-09-11T01:45:16Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2015-09-11T01:45:16Z</InitialReleaseDate>
    <CurrentReleaseDate>2015-09-11T01:45:16Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for tomcat6</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for Tomcat fixes the following security issues:

- CVE-2014-7810: Security manager bypass via EL expressions. (bsc#931442)
It was found that the expression language resolver evaluated expressions within a
privileged code section. A malicious web application could have used this flaw to
bypass security manager protections.

- CVE-2014-0227: Limited DoS in chunked transfer encoding input filter. (bsc#917127)
It was discovered that the ChunkedInputFilter implementation did not fail subsequent
attempts to read input early enough. A remote attacker could have used this flaw to
perform a denial of service attack, by streaming an unlimited quantity of data,
leading to consumption of server resources.

- CVE-2014-0230: Non-persistent DoS attack by feeding data by aborting an upload
It was possible for a remote attacker to trigger a non-persistent DoS attack by
feeding data by aborting an upload. (bsc#926762)

Additionally, the following non-security issues have been fixed:

- Fix rights of all files within /usr/share/tomcat6/bin. (bsc#906152)
- Don't overwrite /var/run/tomcat6.pid when Tomcat is already running. (bsc#934219)
- Miscellaneous fixes and improvements to Tomcat's init script. (bsc#932698)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">slessp4-tomcat6-12092</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20151565-1/</URL>
      <Description>Link for SUSE-SU-2015:1565-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2015-September/001594.html</URL>
      <Description>E-Mail link for SUSE-SU-2015:1565-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/906152</URL>
      <Description>SUSE Bug 906152</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/917127</URL>
      <Description>SUSE Bug 917127</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/926762</URL>
      <Description>SUSE Bug 926762</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/931442</URL>
      <Description>SUSE Bug 931442</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/932698</URL>
      <Description>SUSE Bug 932698</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/934219</URL>
      <Description>SUSE Bug 934219</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-0227/</URL>
      <Description>SUSE CVE CVE-2014-0227 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-0230/</URL>
      <Description>SUSE CVE CVE-2014-0230 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-7810/</URL>
      <Description>SUSE CVE CVE-2014-7810 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 11 SP4">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 11 SP4">
        <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4" CPE="cpe:/o:suse:suse_sles:11:sp4">SUSE Linux Enterprise Server 11 SP4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 11 SP4">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 11 SP4">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP4" CPE="cpe:/o:suse:sles_sap:11:sp4">SUSE Linux Enterprise Server for SAP Applications 11 SP4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="tomcat6-6.0.41-0.47.1">
      <FullProductName ProductID="tomcat6-6.0.41-0.47.1">tomcat6-6.0.41-0.47.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tomcat6-admin-webapps-6.0.41-0.47.1">
      <FullProductName ProductID="tomcat6-admin-webapps-6.0.41-0.47.1">tomcat6-admin-webapps-6.0.41-0.47.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tomcat6-docs-webapp-6.0.41-0.47.1">
      <FullProductName ProductID="tomcat6-docs-webapp-6.0.41-0.47.1">tomcat6-docs-webapp-6.0.41-0.47.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tomcat6-javadoc-6.0.41-0.47.1">
      <FullProductName ProductID="tomcat6-javadoc-6.0.41-0.47.1">tomcat6-javadoc-6.0.41-0.47.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tomcat6-jsp-2_1-api-6.0.41-0.47.1">
      <FullProductName ProductID="tomcat6-jsp-2_1-api-6.0.41-0.47.1">tomcat6-jsp-2_1-api-6.0.41-0.47.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tomcat6-lib-6.0.41-0.47.1">
      <FullProductName ProductID="tomcat6-lib-6.0.41-0.47.1">tomcat6-lib-6.0.41-0.47.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tomcat6-servlet-2_5-api-6.0.41-0.47.1">
      <FullProductName ProductID="tomcat6-servlet-2_5-api-6.0.41-0.47.1">tomcat6-servlet-2_5-api-6.0.41-0.47.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tomcat6-webapps-6.0.41-0.47.1">
      <FullProductName ProductID="tomcat6-webapps-6.0.41-0.47.1">tomcat6-webapps-6.0.41-0.47.1</FullProductName>
    </Branch>
    <Relationship ProductReference="tomcat6-6.0.41-0.47.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4:tomcat6-6.0.41-0.47.1">tomcat6-6.0.41-0.47.1 as a component of SUSE Linux Enterprise Server 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat6-admin-webapps-6.0.41-0.47.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4:tomcat6-admin-webapps-6.0.41-0.47.1">tomcat6-admin-webapps-6.0.41-0.47.1 as a component of SUSE Linux Enterprise Server 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat6-docs-webapp-6.0.41-0.47.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4:tomcat6-docs-webapp-6.0.41-0.47.1">tomcat6-docs-webapp-6.0.41-0.47.1 as a component of SUSE Linux Enterprise Server 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat6-javadoc-6.0.41-0.47.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4:tomcat6-javadoc-6.0.41-0.47.1">tomcat6-javadoc-6.0.41-0.47.1 as a component of SUSE Linux Enterprise Server 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat6-jsp-2_1-api-6.0.41-0.47.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4:tomcat6-jsp-2_1-api-6.0.41-0.47.1">tomcat6-jsp-2_1-api-6.0.41-0.47.1 as a component of SUSE Linux Enterprise Server 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat6-lib-6.0.41-0.47.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4:tomcat6-lib-6.0.41-0.47.1">tomcat6-lib-6.0.41-0.47.1 as a component of SUSE Linux Enterprise Server 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat6-servlet-2_5-api-6.0.41-0.47.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4:tomcat6-servlet-2_5-api-6.0.41-0.47.1">tomcat6-servlet-2_5-api-6.0.41-0.47.1 as a component of SUSE Linux Enterprise Server 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat6-webapps-6.0.41-0.47.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4:tomcat6-webapps-6.0.41-0.47.1">tomcat6-webapps-6.0.41-0.47.1 as a component of SUSE Linux Enterprise Server 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat6-6.0.41-0.47.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-6.0.41-0.47.1">tomcat6-6.0.41-0.47.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat6-admin-webapps-6.0.41-0.47.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-admin-webapps-6.0.41-0.47.1">tomcat6-admin-webapps-6.0.41-0.47.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat6-docs-webapp-6.0.41-0.47.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-docs-webapp-6.0.41-0.47.1">tomcat6-docs-webapp-6.0.41-0.47.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat6-javadoc-6.0.41-0.47.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-javadoc-6.0.41-0.47.1">tomcat6-javadoc-6.0.41-0.47.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat6-jsp-2_1-api-6.0.41-0.47.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-jsp-2_1-api-6.0.41-0.47.1">tomcat6-jsp-2_1-api-6.0.41-0.47.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat6-lib-6.0.41-0.47.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-lib-6.0.41-0.47.1">tomcat6-lib-6.0.41-0.47.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat6-servlet-2_5-api-6.0.41-0.47.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-servlet-2_5-api-6.0.41-0.47.1">tomcat6-servlet-2_5-api-6.0.41-0.47.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat6-webapps-6.0.41-0.47.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-webapps-6.0.41-0.47.1">tomcat6-webapps-6.0.41-0.47.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP4</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in Apache Tomcat 6.x before 6.0.42, 7.x before 7.0.55, and 8.x before 8.0.9 does not properly handle attempts to continue reading data after an error has occurred, which allows remote attackers to conduct HTTP request smuggling attacks or cause a denial of service (resource consumption) by streaming data with malformed chunked transfer coding.</Note>
    </Notes>
    <CVE>CVE-2014-0227</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4:tomcat6-6.0.41-0.47.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:tomcat6-admin-webapps-6.0.41-0.47.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:tomcat6-docs-webapp-6.0.41-0.47.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:tomcat6-javadoc-6.0.41-0.47.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:tomcat6-jsp-2_1-api-6.0.41-0.47.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:tomcat6-lib-6.0.41-0.47.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:tomcat6-servlet-2_5-api-6.0.41-0.47.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:tomcat6-webapps-6.0.41-0.47.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-6.0.41-0.47.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-admin-webapps-6.0.41-0.47.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-docs-webapp-6.0.41-0.47.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-javadoc-6.0.41-0.47.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-jsp-2_1-api-6.0.41-0.47.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-lib-6.0.41-0.47.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-servlet-2_5-api-6.0.41-0.47.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-webapps-6.0.41-0.47.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.4</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20151565-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-0227.html</URL>
        <Description>CVE-2014-0227</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/917127</URL>
        <Description>SUSE Bug 917127</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/926762</URL>
        <Description>SUSE Bug 926762</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/988489</URL>
        <Description>SUSE Bug 988489</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Apache Tomcat 6.x before 6.0.44, 7.x before 7.0.55, and 8.x before 8.0.9 does not properly handle cases where an HTTP response occurs before finishing the reading of an entire request body, which allows remote attackers to cause a denial of service (thread consumption) via a series of aborted upload attempts.</Note>
    </Notes>
    <CVE>CVE-2014-0230</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4:tomcat6-6.0.41-0.47.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:tomcat6-admin-webapps-6.0.41-0.47.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:tomcat6-docs-webapp-6.0.41-0.47.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:tomcat6-javadoc-6.0.41-0.47.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:tomcat6-jsp-2_1-api-6.0.41-0.47.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:tomcat6-lib-6.0.41-0.47.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:tomcat6-servlet-2_5-api-6.0.41-0.47.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:tomcat6-webapps-6.0.41-0.47.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-6.0.41-0.47.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-admin-webapps-6.0.41-0.47.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-docs-webapp-6.0.41-0.47.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-javadoc-6.0.41-0.47.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-jsp-2_1-api-6.0.41-0.47.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-lib-6.0.41-0.47.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-servlet-2_5-api-6.0.41-0.47.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-webapps-6.0.41-0.47.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20151565-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-0230.html</URL>
        <Description>CVE-2014-0230</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/926762</URL>
        <Description>SUSE Bug 926762</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/988489</URL>
        <Description>SUSE Bug 988489</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Expression Language (EL) implementation in Apache Tomcat 6.x before 6.0.44, 7.x before 7.0.58, and 8.x before 8.0.16 does not properly consider the possibility of an accessible interface implemented by an inaccessible class, which allows attackers to bypass a SecurityManager protection mechanism via a web application that leverages use of incorrect privileges during EL evaluation.</Note>
    </Notes>
    <CVE>CVE-2014-7810</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4:tomcat6-6.0.41-0.47.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:tomcat6-admin-webapps-6.0.41-0.47.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:tomcat6-docs-webapp-6.0.41-0.47.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:tomcat6-javadoc-6.0.41-0.47.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:tomcat6-jsp-2_1-api-6.0.41-0.47.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:tomcat6-lib-6.0.41-0.47.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:tomcat6-servlet-2_5-api-6.0.41-0.47.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:tomcat6-webapps-6.0.41-0.47.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-6.0.41-0.47.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-admin-webapps-6.0.41-0.47.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-docs-webapp-6.0.41-0.47.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-javadoc-6.0.41-0.47.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-jsp-2_1-api-6.0.41-0.47.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-lib-6.0.41-0.47.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-servlet-2_5-api-6.0.41-0.47.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:tomcat6-webapps-6.0.41-0.47.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20151565-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-7810.html</URL>
        <Description>CVE-2014-7810</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/931442</URL>
        <Description>SUSE Bug 931442</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
