This update for tomcat fixes the following issues:
Update to Tomcat 9.0.35. See changelog at http://tomcat.apache.org/tomcat-9.0-doc/changelog.html#Tomcat9.0.35(markt)
CVE-2020-9484 (bsc#1171928) Apache Tomcat Remote Code Execution via session persistence
If an attacker was able to control the contents and name of a file on a server configured to use the PersistenceManager, then the attacker could have triggered a remote code execution via deserialization of the file under their control.
{ "binaries": [ { "tomcat-lib": "9.0.35-3.32.1", "tomcat-webapps": "9.0.35-3.32.1", "tomcat-docs-webapp": "9.0.35-3.32.1", "tomcat-servlet-4_0-api": "9.0.35-3.32.1", "tomcat": "9.0.35-3.32.1", "tomcat-el-3_0-api": "9.0.35-3.32.1", "tomcat-admin-webapps": "9.0.35-3.32.1", "tomcat-jsp-2_3-api": "9.0.35-3.32.1", "tomcat-javadoc": "9.0.35-3.32.1" } ] }
{ "binaries": [ { "tomcat-lib": "9.0.35-3.32.1", "tomcat-webapps": "9.0.35-3.32.1", "tomcat-docs-webapp": "9.0.35-3.32.1", "tomcat-servlet-4_0-api": "9.0.35-3.32.1", "tomcat": "9.0.35-3.32.1", "tomcat-el-3_0-api": "9.0.35-3.32.1", "tomcat-admin-webapps": "9.0.35-3.32.1", "tomcat-jsp-2_3-api": "9.0.35-3.32.1", "tomcat-javadoc": "9.0.35-3.32.1" } ] }
{ "binaries": [ { "tomcat-lib": "9.0.35-3.32.1", "tomcat-webapps": "9.0.35-3.32.1", "tomcat-docs-webapp": "9.0.35-3.32.1", "tomcat-servlet-4_0-api": "9.0.35-3.32.1", "tomcat": "9.0.35-3.32.1", "tomcat-el-3_0-api": "9.0.35-3.32.1", "tomcat-admin-webapps": "9.0.35-3.32.1", "tomcat-jsp-2_3-api": "9.0.35-3.32.1", "tomcat-javadoc": "9.0.35-3.32.1" } ] }
{ "binaries": [ { "tomcat-lib": "9.0.35-3.32.1", "tomcat-webapps": "9.0.35-3.32.1", "tomcat-docs-webapp": "9.0.35-3.32.1", "tomcat-servlet-4_0-api": "9.0.35-3.32.1", "tomcat": "9.0.35-3.32.1", "tomcat-el-3_0-api": "9.0.35-3.32.1", "tomcat-admin-webapps": "9.0.35-3.32.1", "tomcat-jsp-2_3-api": "9.0.35-3.32.1", "tomcat-javadoc": "9.0.35-3.32.1" } ] }