diff --git a/tomcat-9.0-CVE-2021-24122.patch b/tomcat-9.0-CVE-2021-24122.patch
new file mode 100644
index 0000000..31ff7f3
--- /dev/null
+++ b/tomcat-9.0-CVE-2021-24122.patch
@@ -0,0 +1,77 @@
+Index: apache-tomcat-9.0.36-src/java/org/apache/catalina/webresources/AbstractFileResourceSet.java
+===================================================================
+--- apache-tomcat-9.0.36-src.orig/java/org/apache/catalina/webresources/AbstractFileResourceSet.java
++++ apache-tomcat-9.0.36-src/java/org/apache/catalina/webresources/AbstractFileResourceSet.java
+@@ -22,11 +22,15 @@ import java.net.MalformedURLException;
+ import java.net.URL;
+
+ import org.apache.catalina.LifecycleException;
++import org.apache.juli.logging.Log;
++import org.apache.juli.logging.LogFactory;
+ import org.apache.tomcat.util.compat.JrePlatform;
+ import org.apache.tomcat.util.http.RequestUtil;
+
+ public abstract class AbstractFileResourceSet extends AbstractResourceSet {
+
++ private static final Log log = LogFactory.getLog(AbstractFileResourceSet.class);
++
+ protected static final String[] EMPTY_STRING_ARRAY = new String[0];
+
+ private File fileBase;
+@@ -128,6 +132,19 @@ public abstract class AbstractFileResour
+ canPath = normalize(canPath);
+ }
+ if (!canPath.equals(absPath)) {
++ if (!canPath.equalsIgnoreCase(absPath)) {
++ // Typically means symlinks are in use but being ignored. Given
++ // the symlink was likely created for a reason, log a warning
++ // that it was ignored.
++ String msg = sm.getString("abstractFileResourceSet.canonicalfileCheckFailed",
++ getRoot().getContext().getName(), absPath, canPath);
++ // Log issues with configuration files at a higher level
++ if(absPath.startsWith("/META-INF/") || absPath.startsWith("/WEB-INF/")) {
++ log.error(msg);
++ } else {
++ log.warn(msg);
++ }
++ }
+ return null;
+ }
+
+@@ -144,7 +161,7 @@ public abstract class AbstractFileResour
+ // expression irrespective of input length.
+ for (int i = 0; i < len; i++) {
+ char c = name.charAt(i);
+- if (c == '\"' || c == '<' || c == '>') {
++ if (c == '\"' || c == '<' || c == '>' || c == ':') {
+ // These characters are disallowed in Windows file names and
+ // there are known problems for file names with these characters
+ // when using File#getCanonicalPath().
+Index: apache-tomcat-9.0.36-src/java/org/apache/catalina/webresources/LocalStrings.properties
+===================================================================
+--- apache-tomcat-9.0.36-src.orig/java/org/apache/catalina/webresources/LocalStrings.properties
++++ apache-tomcat-9.0.36-src/java/org/apache/catalina/webresources/LocalStrings.properties
+@@ -15,6 +15,8 @@
+
+ abstractArchiveResourceSet.setReadOnlyFalse=Archive based WebResourceSets such as those based on JARs are hard-coded to be read-only and may not be configured to be read-write
+
++abstractFileResourceSet.canonicalfileCheckFailed=Resource for web application [{0}] at path [{1}] was not loaded as the canonical path [{2}] did not match. Use of symlinks is one possible cause.
++
+ abstractResource.getContentFail=Unable to return [{0}] as a byte array
+ abstractResource.getContentTooLarge=Unable to return [{0}] as a byte array since the resource is [{1}] bytes in size which is larger than the maximum size of a byte array
+
+Index: apache-tomcat-9.0.36-src/webapps/docs/changelog.xml
+===================================================================
+--- apache-tomcat-9.0.36-src.orig/webapps/docs/changelog.xml
++++ apache-tomcat-9.0.36-src/webapps/docs/changelog.xml
+@@ -81,6 +81,10 @@
+ 64493: Revert possible change of returned protocol
+ attribute value on the Connector
. (remm)
+
++
++ 64871: Log a warning if Tomcat blocks access to a file
++ because it uses symlinks. (markt)
++
+
+
+
diff --git a/tomcat.changes b/tomcat.changes
index 9f88ae6..719fa9c 100644
--- a/tomcat.changes
+++ b/tomcat.changes
@@ -1,3 +1,10 @@
+-------------------------------------------------------------------
+Wed Mar 17 16:16:52 UTC 2021 - Abid Mehmood
+
+- Log if file access is blocked due to symlinks: CVE-2021-24122 (bsc#1180947)
+- Added patch:
+ * tomcat-9.0-CVE-2021-24122
+
-------------------------------------------------------------------
Wed Dec 16 12:17:22 UTC 2020 - Abid Mehmood
diff --git a/tomcat.spec b/tomcat.spec
index c8d7809..10f9d04 100644
--- a/tomcat.spec
+++ b/tomcat.spec
@@ -1,7 +1,7 @@
#
# spec file for package tomcat
#
-# Copyright (c) 2020 SUSE LINUX GmbH, Nuernberg, Germany.
+# Copyright (c) 2021 SUSE LINUX GmbH, Nuernberg, Germany.
# Copyright (c) 2000-2009, JPackage Project
#
# All modifications and additions to the file contributed by third parties
@@ -85,6 +85,7 @@ Patch5: tomcat-9.0.31-java8compat.patch
Patch6: tomcat-9.0.31-secretRequired-default.patch
Patch7: tomcat-9.0-CVE-2020-13943.patch
Patch8: tomcat-9.0-CVE-2020-17527.patch
+Patch9: tomcat-9.0-CVE-2021-24122.patch
BuildRequires: ant >= 1.8.1
BuildRequires: ant-antlr
@@ -261,6 +262,7 @@ find . -type f \( -name "*.bat" -o -name "*.class" -o -name Thumbs.db -o -name "
%patch6 -p1
%patch7 -p1
%patch8 -p1
+%patch9 -p1
# remove date from docs
sed -i -e '/build-date/ d' webapps/docs/tomcat-docs.xsl