<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for tomcat</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2016:0822-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2016-03-18T14:14:17Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2016-03-18T14:14:17Z</InitialReleaseDate>
    <CurrentReleaseDate>2016-03-18T14:14:17Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for tomcat</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
This update for tomcat fixes the following security issues.

Tomcat has been updated from 7.0.55 to 7.0.68.

* CVE-2015-5174: Directory traversal vulnerability in RequestUtil.java
  in Apache Tomcat allowed remote authenticated users to bypass intended
  SecurityManager restrictions and list a parent directory via a /.. (slash
  dot dot) in a pathname used by a web application in a getResource,
  getResourceAsStream, or getResourcePaths call, as demonstrated by the
  $CATALINA_BASE/webapps directory.  (bsc#967967)
* CVE-2015-5346: Session fixation vulnerability in Apache Tomcat when
  different session settings are used for deployments of multiple versions
  of the same web application, might have allowed remote attackers
  to hijack web sessions by leveraging use of a requestedSessionSSL
  field for an unintended request, related to CoyoteAdapter.java and
  Request.java. (bsc#967814)
* CVE-2015-5345: The Mapper component in Apache Tomcat processes redirects
  before considering security constraints and Filters, which allowed remote
  attackers to determine the existence of a directory via a URL that lacks
  a trailing / (slash) character. (bsc#967965)
* CVE-2015-5351: The (1) Manager and (2) Host Manager applications in
  Apache Tomcat established sessions and send CSRF tokens for arbitrary
  new requests, which allowed remote attackers to bypass a CSRF protection
  mechanism by using a token. (bsc#967812)
* CVE-2016-0706: Apache Tomcat did not place
  org.apache.catalina.manager.StatusManagerServlet on the
  org/apache/catalina/core/RestrictedServlets.properties list, which
  allowed remote authenticated users to bypass intended SecurityManager
  restrictions and read arbitrary HTTP requests, and consequently discover
  session ID values, via a crafted web application.  (bsc#967815)
* CVE-2016-0714: The session-persistence implementation in Apache Tomcat
  mishandled session attributes, which allowed remote authenticated users
  to bypass intended SecurityManager restrictions and execute arbitrary
  code in a privileged context via a web application that places a crafted
  object in a session. (bsc#967964)
* CVE-2016-0763: The setGlobalContext method in
  org/apache/naming/factory/ResourceLinkFactory.java in Apache Tomcat did
  not consider whether ResourceLinkFactory.setGlobalContext callers are
  authorized, which allowed remote authenticated users to bypass intended
  SecurityManager restrictions and read or write to arbitrary application
  data, or cause a denial of service (application disruption), via a web
  application that sets a crafted global context.  (bsc#967966)

See https://tomcat.apache.org/tomcat-7.0-doc/changelog.html
  for other fixes since 7.0.55
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-SLE-SERVER-12-2016-478</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20160822-1/</URL>
      <Description>Link for SUSE-SU-2016:0822-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2016-03/msg00069.html</URL>
      <Description>E-Mail link for SUSE-SU-2016:0822-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/967812</URL>
      <Description>SUSE Bug 967812</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/967814</URL>
      <Description>SUSE Bug 967814</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/967815</URL>
      <Description>SUSE Bug 967815</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/967964</URL>
      <Description>SUSE Bug 967964</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/967965</URL>
      <Description>SUSE Bug 967965</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/967966</URL>
      <Description>SUSE Bug 967966</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/967967</URL>
      <Description>SUSE Bug 967967</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-5174/</URL>
      <Description>SUSE CVE CVE-2015-5174 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-5345/</URL>
      <Description>SUSE CVE CVE-2015-5345 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-5346/</URL>
      <Description>SUSE CVE CVE-2015-5346 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-5351/</URL>
      <Description>SUSE CVE CVE-2015-5351 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0706/</URL>
      <Description>SUSE CVE CVE-2016-0706 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0714/</URL>
      <Description>SUSE CVE CVE-2016-0714 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-0763/</URL>
      <Description>SUSE CVE CVE-2016-0763 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 12">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 12">
        <FullProductName ProductID="SUSE Linux Enterprise Server 12" CPE="cpe:/o:suse:sles:12">SUSE Linux Enterprise Server 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 12">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 12">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12" CPE="cpe:/o:suse:sles_sap:12">SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="tomcat-7.0.68-7.6.1">
      <FullProductName ProductID="tomcat-7.0.68-7.6.1">tomcat-7.0.68-7.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tomcat-admin-webapps-7.0.68-7.6.1">
      <FullProductName ProductID="tomcat-admin-webapps-7.0.68-7.6.1">tomcat-admin-webapps-7.0.68-7.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tomcat-docs-webapp-7.0.68-7.6.1">
      <FullProductName ProductID="tomcat-docs-webapp-7.0.68-7.6.1">tomcat-docs-webapp-7.0.68-7.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tomcat-el-2_2-api-7.0.68-7.6.1">
      <FullProductName ProductID="tomcat-el-2_2-api-7.0.68-7.6.1">tomcat-el-2_2-api-7.0.68-7.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tomcat-javadoc-7.0.68-7.6.1">
      <FullProductName ProductID="tomcat-javadoc-7.0.68-7.6.1">tomcat-javadoc-7.0.68-7.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tomcat-jsp-2_2-api-7.0.68-7.6.1">
      <FullProductName ProductID="tomcat-jsp-2_2-api-7.0.68-7.6.1">tomcat-jsp-2_2-api-7.0.68-7.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tomcat-lib-7.0.68-7.6.1">
      <FullProductName ProductID="tomcat-lib-7.0.68-7.6.1">tomcat-lib-7.0.68-7.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tomcat-servlet-3_0-api-7.0.68-7.6.1">
      <FullProductName ProductID="tomcat-servlet-3_0-api-7.0.68-7.6.1">tomcat-servlet-3_0-api-7.0.68-7.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="tomcat-webapps-7.0.68-7.6.1">
      <FullProductName ProductID="tomcat-webapps-7.0.68-7.6.1">tomcat-webapps-7.0.68-7.6.1</FullProductName>
    </Branch>
    <Relationship ProductReference="tomcat-7.0.68-7.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12:tomcat-7.0.68-7.6.1">tomcat-7.0.68-7.6.1 as a component of SUSE Linux Enterprise Server 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat-admin-webapps-7.0.68-7.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12:tomcat-admin-webapps-7.0.68-7.6.1">tomcat-admin-webapps-7.0.68-7.6.1 as a component of SUSE Linux Enterprise Server 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat-docs-webapp-7.0.68-7.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12:tomcat-docs-webapp-7.0.68-7.6.1">tomcat-docs-webapp-7.0.68-7.6.1 as a component of SUSE Linux Enterprise Server 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat-el-2_2-api-7.0.68-7.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12:tomcat-el-2_2-api-7.0.68-7.6.1">tomcat-el-2_2-api-7.0.68-7.6.1 as a component of SUSE Linux Enterprise Server 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat-javadoc-7.0.68-7.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12:tomcat-javadoc-7.0.68-7.6.1">tomcat-javadoc-7.0.68-7.6.1 as a component of SUSE Linux Enterprise Server 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat-jsp-2_2-api-7.0.68-7.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12:tomcat-jsp-2_2-api-7.0.68-7.6.1">tomcat-jsp-2_2-api-7.0.68-7.6.1 as a component of SUSE Linux Enterprise Server 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat-lib-7.0.68-7.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12:tomcat-lib-7.0.68-7.6.1">tomcat-lib-7.0.68-7.6.1 as a component of SUSE Linux Enterprise Server 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat-servlet-3_0-api-7.0.68-7.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12:tomcat-servlet-3_0-api-7.0.68-7.6.1">tomcat-servlet-3_0-api-7.0.68-7.6.1 as a component of SUSE Linux Enterprise Server 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat-webapps-7.0.68-7.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12:tomcat-webapps-7.0.68-7.6.1">tomcat-webapps-7.0.68-7.6.1 as a component of SUSE Linux Enterprise Server 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat-7.0.68-7.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:tomcat-7.0.68-7.6.1">tomcat-7.0.68-7.6.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat-admin-webapps-7.0.68-7.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:tomcat-admin-webapps-7.0.68-7.6.1">tomcat-admin-webapps-7.0.68-7.6.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat-docs-webapp-7.0.68-7.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:tomcat-docs-webapp-7.0.68-7.6.1">tomcat-docs-webapp-7.0.68-7.6.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat-el-2_2-api-7.0.68-7.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:tomcat-el-2_2-api-7.0.68-7.6.1">tomcat-el-2_2-api-7.0.68-7.6.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat-javadoc-7.0.68-7.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:tomcat-javadoc-7.0.68-7.6.1">tomcat-javadoc-7.0.68-7.6.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat-jsp-2_2-api-7.0.68-7.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:tomcat-jsp-2_2-api-7.0.68-7.6.1">tomcat-jsp-2_2-api-7.0.68-7.6.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat-lib-7.0.68-7.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:tomcat-lib-7.0.68-7.6.1">tomcat-lib-7.0.68-7.6.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat-servlet-3_0-api-7.0.68-7.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:tomcat-servlet-3_0-api-7.0.68-7.6.1">tomcat-servlet-3_0-api-7.0.68-7.6.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="tomcat-webapps-7.0.68-7.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:tomcat-webapps-7.0.68-7.6.1">tomcat-webapps-7.0.68-7.6.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Directory traversal vulnerability in RequestUtil.java in Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.65, and 8.x before 8.0.27 allows remote authenticated users to bypass intended SecurityManager restrictions and list a parent directory via a /.. (slash dot dot) in a pathname used by a web application in a getResource, getResourceAsStream, or getResourcePaths call, as demonstrated by the $CATALINA_BASE/webapps directory.</Note>
    </Notes>
    <CVE>CVE-2015-5174</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12:tomcat-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:tomcat-admin-webapps-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:tomcat-docs-webapp-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:tomcat-el-2_2-api-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:tomcat-javadoc-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:tomcat-jsp-2_2-api-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:tomcat-lib-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:tomcat-servlet-3_0-api-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:tomcat-webapps-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:tomcat-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:tomcat-admin-webapps-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:tomcat-docs-webapp-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:tomcat-el-2_2-api-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:tomcat-javadoc-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:tomcat-jsp-2_2-api-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:tomcat-lib-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:tomcat-servlet-3_0-api-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:tomcat-webapps-7.0.68-7.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:A/AC:M/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20160822-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-5174.html</URL>
        <Description>CVE-2015-5174</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/967967</URL>
        <Description>SUSE Bug 967967</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Mapper component in Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.68, 8.x before 8.0.30, and 9.x before 9.0.0.M2 processes redirects before considering security constraints and Filters, which allows remote attackers to determine the existence of a directory via a URL that lacks a trailing / (slash) character.</Note>
    </Notes>
    <CVE>CVE-2015-5345</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12:tomcat-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:tomcat-admin-webapps-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:tomcat-docs-webapp-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:tomcat-el-2_2-api-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:tomcat-javadoc-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:tomcat-jsp-2_2-api-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:tomcat-lib-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:tomcat-servlet-3_0-api-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:tomcat-webapps-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:tomcat-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:tomcat-admin-webapps-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:tomcat-docs-webapp-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:tomcat-el-2_2-api-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:tomcat-javadoc-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:tomcat-jsp-2_2-api-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:tomcat-lib-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:tomcat-servlet-3_0-api-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:tomcat-webapps-7.0.68-7.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20160822-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-5345.html</URL>
        <Description>CVE-2015-5345</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/967965</URL>
        <Description>SUSE Bug 967965</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Session fixation vulnerability in Apache Tomcat 7.x before 7.0.66, 8.x before 8.0.30, and 9.x before 9.0.0.M2, when different session settings are used for deployments of multiple versions of the same web application, might allow remote attackers to hijack web sessions by leveraging use of a requestedSessionSSL field for an unintended request, related to CoyoteAdapter.java and Request.java.</Note>
    </Notes>
    <CVE>CVE-2015-5346</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12:tomcat-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:tomcat-admin-webapps-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:tomcat-docs-webapp-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:tomcat-el-2_2-api-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:tomcat-javadoc-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:tomcat-jsp-2_2-api-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:tomcat-lib-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:tomcat-servlet-3_0-api-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:tomcat-webapps-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:tomcat-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:tomcat-admin-webapps-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:tomcat-docs-webapp-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:tomcat-el-2_2-api-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:tomcat-javadoc-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:tomcat-jsp-2_2-api-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:tomcat-lib-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:tomcat-servlet-3_0-api-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:tomcat-webapps-7.0.68-7.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.4</BaseScore>
        <Vector>AV:A/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20160822-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-5346.html</URL>
        <Description>CVE-2015-5346</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/967814</URL>
        <Description>SUSE Bug 967814</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The (1) Manager and (2) Host Manager applications in Apache Tomcat 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 establish sessions and send CSRF tokens for arbitrary new requests, which allows remote attackers to bypass a CSRF protection mechanism by using a token.</Note>
    </Notes>
    <CVE>CVE-2015-5351</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12:tomcat-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:tomcat-admin-webapps-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:tomcat-docs-webapp-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:tomcat-el-2_2-api-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:tomcat-javadoc-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:tomcat-jsp-2_2-api-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:tomcat-lib-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:tomcat-servlet-3_0-api-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:tomcat-webapps-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:tomcat-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:tomcat-admin-webapps-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:tomcat-docs-webapp-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:tomcat-el-2_2-api-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:tomcat-javadoc-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:tomcat-jsp-2_2-api-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:tomcat-lib-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:tomcat-servlet-3_0-api-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:tomcat-webapps-7.0.68-7.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.4</BaseScore>
        <Vector>AV:A/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20160822-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-5351.html</URL>
        <Description>CVE-2015-5351</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/967812</URL>
        <Description>SUSE Bug 967812</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 does not place org.apache.catalina.manager.StatusManagerServlet on the org/apache/catalina/core/RestrictedServlets.properties list, which allows remote authenticated users to bypass intended SecurityManager restrictions and read arbitrary HTTP requests, and consequently discover session ID values, via a crafted web application.</Note>
    </Notes>
    <CVE>CVE-2016-0706</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12:tomcat-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:tomcat-admin-webapps-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:tomcat-docs-webapp-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:tomcat-el-2_2-api-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:tomcat-javadoc-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:tomcat-jsp-2_2-api-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:tomcat-lib-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:tomcat-servlet-3_0-api-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:tomcat-webapps-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:tomcat-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:tomcat-admin-webapps-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:tomcat-docs-webapp-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:tomcat-el-2_2-api-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:tomcat-javadoc-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:tomcat-jsp-2_2-api-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:tomcat-lib-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:tomcat-servlet-3_0-api-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:tomcat-webapps-7.0.68-7.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20160822-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0706.html</URL>
        <Description>CVE-2016-0706</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/967815</URL>
        <Description>SUSE Bug 967815</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971085</URL>
        <Description>SUSE Bug 971085</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/988489</URL>
        <Description>SUSE Bug 988489</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The session-persistence implementation in Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 mishandles session attributes, which allows remote authenticated users to bypass intended SecurityManager restrictions and execute arbitrary code in a privileged context via a web application that places a crafted object in a session.</Note>
    </Notes>
    <CVE>CVE-2016-0714</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12:tomcat-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:tomcat-admin-webapps-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:tomcat-docs-webapp-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:tomcat-el-2_2-api-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:tomcat-javadoc-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:tomcat-jsp-2_2-api-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:tomcat-lib-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:tomcat-servlet-3_0-api-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:tomcat-webapps-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:tomcat-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:tomcat-admin-webapps-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:tomcat-docs-webapp-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:tomcat-el-2_2-api-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:tomcat-javadoc-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:tomcat-jsp-2_2-api-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:tomcat-lib-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:tomcat-servlet-3_0-api-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:tomcat-webapps-7.0.68-7.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20160822-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0714.html</URL>
        <Description>CVE-2016-0714</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/967964</URL>
        <Description>SUSE Bug 967964</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971085</URL>
        <Description>SUSE Bug 971085</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The setGlobalContext method in org/apache/naming/factory/ResourceLinkFactory.java in Apache Tomcat 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M3 does not consider whether ResourceLinkFactory.setGlobalContext callers are authorized, which allows remote authenticated users to bypass intended SecurityManager restrictions and read or write to arbitrary application data, or cause a denial of service (application disruption), via a web application that sets a crafted global context.</Note>
    </Notes>
    <CVE>CVE-2016-0763</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12:tomcat-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:tomcat-admin-webapps-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:tomcat-docs-webapp-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:tomcat-el-2_2-api-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:tomcat-javadoc-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:tomcat-jsp-2_2-api-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:tomcat-lib-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:tomcat-servlet-3_0-api-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:tomcat-webapps-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:tomcat-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:tomcat-admin-webapps-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:tomcat-docs-webapp-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:tomcat-el-2_2-api-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:tomcat-javadoc-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:tomcat-jsp-2_2-api-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:tomcat-lib-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:tomcat-servlet-3_0-api-7.0.68-7.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:tomcat-webapps-7.0.68-7.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20160822-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0763.html</URL>
        <Description>CVE-2016-0763</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/967966</URL>
        <Description>SUSE Bug 967966</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/971085</URL>
        <Description>SUSE Bug 971085</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
