tomcat6-6.0.24-98.AXS4

エラータID: AXSA:2016-705:03

Release date: 
Tuesday, October 11, 2016 - 03:09
Subject: 
tomcat6-6.0.24-98.AXS4
Affected Channels: 
Asianux Server 4 for x86_64
Asianux Server 4 for x86
Severity: 
High
Description: 

Tomcat is the servlet container that is used in the official Reference
Implementation for the Java Servlet and JavaServer Pages technologies.
The Java Servlet and JavaServer Pages specifications are developed by
Sun under the Java Community Process.

Tomcat is developed in an open and participatory environment and
released under the Apache Software License version 2.0. Tomcat is intended
to be a collaboration of the best-of-breed developers from around the world.

Security issues fixed with this release:

CVE-2015-5174
Directory traversal vulnerability in RequestUtil.java in Apache Tomcat
6.x before 6.0.45, 7.x before 7.0.65, and 8.x before 8.0.27 allows
remote authenticated users to bypass intended SecurityManager
restrictions and list a parent directory via a /.. (slash dot dot) in
a pathname used by a web application in a getResource,
getResourceAsStream, or getResourcePaths call, as demonstrated by the
$CATALINA_BASE/webapps directory.
CVE-2015-5345
The Mapper component in Apache Tomcat 6.x before 6.0.45, 7.x before
7.0.68, 8.x before 8.0.30, and 9.x before 9.0.0.M2 processes redirects
before considering security constraints and Filters, which allows
remote attackers to determine the existence of a directory via a URL
that lacks a trailing / (slash) character.
CVE-2016-0706
Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.68, 8.x before 8.0.31,
and 9.x before 9.0.0.M2 does not place
org.apache.catalina.manager.StatusManagerServlet on the
org/apache/catalina/core/RestrictedServlets.properties list, which
allows remote authenticated users to bypass intended SecurityManager
restrictions and read arbitrary HTTP requests, and consequently
discover session ID values, via a crafted web application.
CVE-2016-0714
The session-persistence implementation in Apache Tomcat 6.x before
6.0.45, 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2
mishandles session attributes, which allows remote authenticated users
to bypass intended SecurityManager restrictions and execute arbitrary
code in a privileged context via a web application that places a
crafted object in a session.
CVE-2016-5388
Apache Tomcat through 8.5.4, when the CGI Servlet is enabled, follows
RFC 3875 section 4.1.18 and therefore does not protect applications
from the presence of untrusted client data in the HTTP_PROXY
environment variable, which might allow remote attackers to redirect
an application's outbound HTTP traffic to an arbitrary proxy server
via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue.
NOTE: the vendor states "A mitigation is planned for future releases
of Tomcat, tracked as CVE-2016-5388"; in other words, this is not a
CVE ID for a vulnerability.
CVE-2016-6325
** RESERVED **
This candidate has been reserved by an organization or individual that
will use it when announcing a new security problem. When the
candidate has been publicized, the details for this candidate will be
provided.

Fixed bugs:

* Due to a bug in the tomcat6 spec file, the catalina.out file's md5sum, size, and mtime attributes were compared to the file's attributes at installation time. Because these attributes change after the service is started, the "rpm -V" command previously failed. With this update, the attributes mentioned above are ignored in the RPM verification and the catalina.out file now passes the verification check.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. tomcat6-6.0.24-98.AXS4.src.rpm
    MD5: 70600565d6cc370b20b055508132fee9
    SHA-256: f7b113dcbd1387cce7396b0b44911265234d766d85da19d22c4a355a0b51d649
    Size: 3.63 MB

Asianux Server 4 for x86
  1. tomcat6-6.0.24-98.AXS4.noarch.rpm
    MD5: 7bb8cf75caf9428cbaab5ba2e8af8414
    SHA-256: d9edba25d7e5b6245611f083dfd6e4bef8f7b8f2e595c7cc6b017a63c9fe9be6
    Size: 93.98 kB
  2. tomcat6-el-2.1-api-6.0.24-98.AXS4.noarch.rpm
    MD5: cb76e507343a9ceb1ec703f9feabb17d
    SHA-256: a7c057602f2206305b394e5e502b0291a142c5e4e334ae85e20115331dcf1a08
    Size: 49.84 kB
  3. tomcat6-jsp-2.1-api-6.0.24-98.AXS4.noarch.rpm
    MD5: 443b328b0f7d84d7475e3e19ac3504bb
    SHA-256: 332b4780cf126910378d985101b2cefce11484598cc147f28277c434a8c3b69c
    Size: 86.29 kB
  4. tomcat6-lib-6.0.24-98.AXS4.noarch.rpm
    MD5: aadc89e90cc1a84c2294ed26860196ca
    SHA-256: 488a64a4b57df685f52c90e01e439a505a62728fd9e81e3b39d5076aeb95c781
    Size: 2.91 MB
  5. tomcat6-servlet-2.5-api-6.0.24-98.AXS4.noarch.rpm
    MD5: bad9cb028b87dd51481f8749977ae328
    SHA-256: 0c92f90818b29af9f946a262736969536ad588f17d02a173d51d05fc629efa9d
    Size: 120.32 kB

Asianux Server 4 for x86_64
  1. tomcat6-6.0.24-98.AXS4.noarch.rpm
    MD5: c0289fb4c81427b0719a973ba4fb3d67
    SHA-256: fae387729295c16835b7d45d726eb23d5ebb34269b26498addbf64edc92c44c4
    Size: 93.54 kB
  2. tomcat6-el-2.1-api-6.0.24-98.AXS4.noarch.rpm
    MD5: 1ffcac3c23fd34b0825ff81df0ff73e1
    SHA-256: 8e66588fd4334e233386a1fd50f93a9773bb7e0be97e137db67b06bb25fb9764
    Size: 49.38 kB
  3. tomcat6-jsp-2.1-api-6.0.24-98.AXS4.noarch.rpm
    MD5: 48cec9de28d855791995eb52cc3f8ee4
    SHA-256: f29bdb7454cb7044a1343f61ae662bc1897d5ae8ffcdbd7f36deb34dd19646b7
    Size: 85.84 kB
  4. tomcat6-lib-6.0.24-98.AXS4.noarch.rpm
    MD5: 46ab5e3b43261fe666a8c77f41c644d8
    SHA-256: f0c9405753b60cd7d185bc27b9c0a76e5da6598b7d8476f9d460181535174cfe
    Size: 2.91 MB
  5. tomcat6-servlet-2.5-api-6.0.24-98.AXS4.noarch.rpm
    MD5: 1f80fb20ba46c64844006f7ae915acd8
    SHA-256: 64bad25ad5f0102ce582c6a4f72aca698057bd38591c00143a4e4bb6841caf1e
    Size: 119.88 kB