tomcat6-6.0.24-35.AXS4

エラータID: AXSA:2012-03:01

Release date: 
Wednesday, January 4, 2012 - 13:46
Subject: 
tomcat6-6.0.24-35.AXS4
Affected Channels: 
Asianux Server 4 for x86
Asianux Server 4 for x86_64
Severity: 
High
Description: 

Tomcat is the servlet container that is used in the official Reference Implementation for the Java Servlet and JavaServer Pages technologies.
The Java Servlet and JavaServer Pages specifications are developed by Sun under the Java Community Process.
Tomcat is developed in an open and participatory environment and released under the Apache Software License version 2.0. Tomcat is intended to be a collaboration of the best-of-breed developers from around the world.
Security issues fixed with this release:
CVE-2011-1184
No information available at the time of writing, please use the CVE link below.
CVE-2011-2204
Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.17, when the MemoryUserDatabase is used, creates log entries containing passwords upon encountering errors in JMX user creation, which allows local users to obtain sensitive information by reading a log file.
CVE-2011-2526
Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.19, when sendfile is enabled for the HTTP APR or HTTP NIO connector, does not validate certain request attributes, which allows local users to bypass intended file access restrictions or cause a denial of service (infinite loop or JVM crash) by leveraging an untrusted web application.
CVE-2011-3190
Certain AJP protocol connector implementations in Apache Tomcat 7.0.0 through 7.0.20, 6.0.0 through 6.0.33, 5.5.0 through 5.5.33, and possibly other versions allow remote attackers to spoof AJP requests, bypass authentication, and obtain sensitive information by causing the connector to interpret a request body as a new request.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. tomcat6-6.0.24-35.AXS4.src.rpm
    MD5: 6f0bacaab6f4fdb275a2d55a0a278c63
    SHA-256: 8db0a56411acbf5674d11e1de1062875a72cfeefdc392e95b6c26e77eba29665
    Size: 3.34 MB

Asianux Server 4 for x86
  1. tomcat6-6.0.24-35.AXS4.noarch.rpm
    MD5: 92d5484053d22e56603c075304b2f123
    SHA-256: 01abeb993c5293411c5f2fe6b95d32264b59e90c3f167413fd15c86eff0a0b2b
    Size: 86.09 kB
  2. tomcat6-el-2.1-api-6.0.24-35.AXS4.noarch.rpm
    MD5: 1c9c198e6a998cf85f67503926581437
    SHA-256: ffe4539e119db57f5176e79a3e4c206bc7457b647bec883ee9ecb26dd1ceab76
    Size: 41.46 kB
  3. tomcat6-jsp-2.1-api-6.0.24-35.AXS4.noarch.rpm
    MD5: 58f5597662aee5299aadd16b80675abb
    SHA-256: ab1f93095c45d7ed23eb5c3c866d3ffee89f6924fceca582f2607955f5189dac
    Size: 78.35 kB
  4. tomcat6-lib-6.0.24-35.AXS4.noarch.rpm
    MD5: ac245cffdd6b1185f0bfb0b623b5073f
    SHA-256: 9dcbd347c30105c02460ae4c70d628a2097b711a1b526c90556f587a4f68d477
    Size: 2.82 MB
  5. tomcat6-servlet-2.5-api-6.0.24-35.AXS4.noarch.rpm
    MD5: ead05665a0d1e3d406b1d9316c268acf
    SHA-256: 9df447fb5b2e56024e872a98c2950b1ead4047795ef77a174f402f0df8bb269d
    Size: 92.23 kB

Asianux Server 4 for x86_64
  1. tomcat6-6.0.24-35.AXS4.noarch.rpm
    MD5: 1c08dd6e4222e6c13ba95c88dce2f1fb
    SHA-256: e6f9048ffce64e123cdbd546c576971f44352c1c266cfe5f3cd6d58da3cec426
    Size: 85.64 kB
  2. tomcat6-el-2.1-api-6.0.24-35.AXS4.noarch.rpm
    MD5: 088e29c17c8072a05e39ba0f83af9000
    SHA-256: 2ea7c11707ada55a8c6491afad3a15763c77cbf5531c678365a3ab506c345790
    Size: 41.01 kB
  3. tomcat6-jsp-2.1-api-6.0.24-35.AXS4.noarch.rpm
    MD5: 2d9bec08682ffc47604b0e204ec65dbe
    SHA-256: 83e73aa4f57d24971a91b627faae1e986b316fe3a7e7fa1a40bc8e30f9996161
    Size: 77.90 kB
  4. tomcat6-lib-6.0.24-35.AXS4.noarch.rpm
    MD5: dd6e69278c98b80250dbca35eef0483a
    SHA-256: 114abb24f66324a2e6f69fb205843bfb2f16714bc0538e00ee0427366bec71d7
    Size: 2.82 MB
  5. tomcat6-servlet-2.5-api-6.0.24-35.AXS4.noarch.rpm
    MD5: 6e2b9bd3cbd02126e16cea447bcf8591
    SHA-256: edb636209b636d111a7889117b1035cf0d27f13ca11313cb7d83bf9c2fbee14d
    Size: 91.79 kB