{
	"document":{
		"aggregate_severity":{
			"namespace":"https://nvd.nist.gov/vuln-metrics/cvss",
			"text":"High"
		},
		"category":"csaf_vex",
		"csaf_version":"2.0",
		"distribution":{
			"tlp":{
				"label":"WHITE",
				"url":"https:/www.first.org/tlp/"
			}
		},
		"lang":"en",
		"notes":[
			{
				"text":"tomcat security update",
				"category":"general",
				"title":"Synopsis"
			},
			{
				"text":"An update for tomcat is now available for openEuler-22.03-LTS.",
				"category":"general",
				"title":"Summary"
			},
			{
				"text":"The Apache Tomcat software is developed in an open and participatory environment and released under the Apache License version 2. The Apache Tomcat project is intended to be a collaboration of the best-of-breed developers from around the world. We invite you to participate in this open development project\n\nSecurity Fix(es):\n\nThe fix for bug CVE-2020-9484 introduced a time of check, time of use vulnerability into Apache Tomcat 10.1.0-M1 to 10.1.0-M8, 10.0.0-M5 to 10.0.14, 9.0.35 to 9.0.56 and 8.5.55 to 8.5.73 that allowed a local attacker to perform actions with the privileges of the user that the Tomcat process is using. This issue is only exploitable when Tomcat is configured to persist sessions using the FileStore.(CVE-2022-23181)",
				"category":"general",
				"title":"Description"
			},
			{
				"text":"An update for tomcat is now available for openEuler-22.03-LTS.\n\nopenEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.",
				"category":"general",
				"title":"Topic"
			},
			{
				"text":"High",
				"category":"general",
				"title":"Severity"
			},
			{
				"text":"tomcat",
				"category":"general",
				"title":"Affected Component"
			}
		],
		"publisher":{
			"issuing_authority":"openEuler security committee",
			"name":"openEuler",
			"namespace":"https://www.openeuler.org",
			"contact_details":"openeuler-security@openeuler.org",
			"category":"vendor"
		},
		"references":[
			{
				"summary":"openEuler-SA-2022-2064",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2022-2064"
			},
			{
				"summary":"CVE-2022-23181",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2022-23181&packageName=tomcat"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-23181"
			},
			{
				"summary":"openEuler-SA-2022-2064 vex file",
				"category":"self",
				"url":"https://repo.openeuler.org/security/data/csaf/advisories/2022/csaf-openeuler-sa-2022-2064.json"
			}
		],
		"title":"An update for tomcat is now available for openEuler-22.03-LTS",
		"tracking":{
			"initial_release_date":"2022-11-11T09:49:12+08:00",
			"revision_history":[
				{
					"date":"2022-11-11T09:49:12+08:00",
					"summary":"Initial",
					"number":"1.0.0"
				},
				{
					"date":"2024-10-31T09:49:12+08:00",
					"summary":"final",
					"number":"2.0.0"
				}
			],
			"generator":{
				"date":"2024-10-31T09:49:12+08:00",
				"engine":{
					"name":"openEuler CSAF Tool V1.0"
				}
			},
			"current_release_date":"2024-10-31T09:49:12+08:00",
			"id":"openEuler-SA-2022-2064",
			"version":"2.0.0",
			"status":"final"
		}
	},
	"product_tree":{
		"branches":[
			{
				"name":"openEuler",
				"category":"vendor",
				"branches":[
					{
						"name":"openEuler",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS"
									},
									"product_id":"openEuler-22.03-LTS",
									"name":"openEuler-22.03-LTS"
								},
								"name":"openEuler-22.03-LTS",
								"category":"product_version"
							}
						],
						"category":"product_name"
					},
					{
						"name":"noarch",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS"
									},
									"product_id":"tomcat-help-9.0.10-26.oe2203.noarch.rpm",
									"name":"tomcat-help-9.0.10-26.oe2203.noarch.rpm"
								},
								"name":"tomcat-help-9.0.10-26.oe2203.noarch.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS"
									},
									"product_id":"tomcat-9.0.10-26.oe2203.noarch.rpm",
									"name":"tomcat-9.0.10-26.oe2203.noarch.rpm"
								},
								"name":"tomcat-9.0.10-26.oe2203.noarch.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS"
									},
									"product_id":"tomcat-jsvc-9.0.10-26.oe2203.noarch.rpm",
									"name":"tomcat-jsvc-9.0.10-26.oe2203.noarch.rpm"
								},
								"name":"tomcat-jsvc-9.0.10-26.oe2203.noarch.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"src",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS"
									},
									"product_id":"tomcat-9.0.10-26.oe2203.src.rpm",
									"name":"tomcat-9.0.10-26.oe2203.src.rpm"
								},
								"name":"tomcat-9.0.10-26.oe2203.src.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					}
				]
			}
		],
		"relationships":[
			{
				"relates_to_product_reference":"openEuler-22.03-LTS",
				"product_reference":"tomcat-help-9.0.10-26.oe2203.noarch.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS:tomcat-help-9.0.10-26.oe2203.noarch",
					"name":"tomcat-help-9.0.10-26.oe2203.noarch as a component of openEuler-22.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS",
				"product_reference":"tomcat-9.0.10-26.oe2203.noarch.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS:tomcat-9.0.10-26.oe2203.noarch",
					"name":"tomcat-9.0.10-26.oe2203.noarch as a component of openEuler-22.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS",
				"product_reference":"tomcat-jsvc-9.0.10-26.oe2203.noarch.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS:tomcat-jsvc-9.0.10-26.oe2203.noarch",
					"name":"tomcat-jsvc-9.0.10-26.oe2203.noarch as a component of openEuler-22.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS",
				"product_reference":"tomcat-9.0.10-26.oe2203.src.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS:tomcat-9.0.10-26.oe2203.src",
					"name":"tomcat-9.0.10-26.oe2203.src as a component of openEuler-22.03-LTS"
				},
				"category":"default_component_of"
			}
		]
	},
	"vulnerabilities":[
		{
			"cve":"CVE-2022-23181",
			"notes":[
				{
					"text":"The fix for bug CVE-2020-9484 introduced a time of check, time of use vulnerability into Apache Tomcat 10.1.0-M1 to 10.1.0-M8, 10.0.0-M5 to 10.0.14, 9.0.35 to 9.0.56 and 8.5.55 to 8.5.73 that allowed a local attacker to perform actions with the privileges of the user that the Tomcat process is using. This issue is only exploitable when Tomcat is configured to persist sessions using the FileStore.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS:tomcat-help-9.0.10-26.oe2203.noarch",
					"openEuler-22.03-LTS:tomcat-9.0.10-26.oe2203.noarch",
					"openEuler-22.03-LTS:tomcat-jsvc-9.0.10-26.oe2203.noarch",
					"openEuler-22.03-LTS:tomcat-9.0.10-26.oe2203.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS:tomcat-help-9.0.10-26.oe2203.noarch",
						"openEuler-22.03-LTS:tomcat-9.0.10-26.oe2203.noarch",
						"openEuler-22.03-LTS:tomcat-jsvc-9.0.10-26.oe2203.noarch",
						"openEuler-22.03-LTS:tomcat-9.0.10-26.oe2203.src"
					],
					"details":"tomcat security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2022-2064"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.0,
						"vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS:tomcat-help-9.0.10-26.oe2203.noarch",
						"openEuler-22.03-LTS:tomcat-9.0.10-26.oe2203.noarch",
						"openEuler-22.03-LTS:tomcat-jsvc-9.0.10-26.oe2203.noarch",
						"openEuler-22.03-LTS:tomcat-9.0.10-26.oe2203.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2022-23181"
		}
	]
}