Tomcat was updated to version 7.0.78, fixing various bugs and security
issues.
For full details see
<a href=“https://tomcat.apache.org/tomcat-7.0-doc/changelog.html”>https://tomcat.apache.org/tomcat-7.0-doc/changelog.html</a>
Security issues fixed:
- CVE-2016-0762: A realm timing attack in tomcat was fixed which could
disclose existence of users (bsc#1007854)
- CVE-2016-3092: Usage of vulnerable FileUpload package could have
resulted in denial of service (bsc#986359)
- CVE-2016-5018: A security manager bypass via a Tomcat utility method
that was accessible to web applications was fixed. (bsc#1007855)
- CVE-2016-5388: Setting HTTP_PROXY environment variable via Proxy header
(bsc#988489)
- CVE-2016-6794: A tomcat system property disclosure was fixed.
(bsc#1007857)
- CVE-2016-6796: A tomcat security manager bypass via manipulation of the
configuration parameters for the JSP Servlet. (bsc#1007858)
- CVE-2016-6797: A tomcat unrestricted access to global resources via
ResourceLinkFactory was fixed. (bsc#1007853)
- CVE-2016-6816: A HTTP Request smuggling vulnerability due to permitting
invalid character in HTTP requests was fixed. (bsc#1011812)
- CVE-2016-8735: A Remote code execution vulnerability in
JmxRemoteLifecycleListener was fixed (bsc#1011805)
- CVE-2016-8745: A Tomcat Information Disclosure in the error handling of
send file code for the NIO HTTP connector was fixed. (bsc#1015119)
- CVE-2017-5647: A tomcat information disclosure in pipelined request
processing was fixed. (bsc#1033448)
- CVE-2017-5648: A tomcat information disclosure due to using incorrect
facade objects was fixed (bsc#1033447)