Synopsis:          Important: tomcat6 security update
Advisory ID:       SLSA-2017:3080-1
Issue Date:        2017-10-30
CVE Numbers:       CVE-2017-5664
                   CVE-2017-5647
                   CVE-2017-12615
                   CVE-2017-12617
--

Security Fix(es):

* A vulnerability was discovered in Tomcat's handling of pipelined
requests when "Sendfile" was used. If sendfile processing completed
quickly, it was possible for the Processor to be added to the processor
cache twice. This could lead to invalid responses or information
disclosure. (CVE-2017-5647)

* A vulnerability was discovered in the error page mechanism in Tomcat's
DefaultServlet implementation. A crafted HTTP request could cause
undesired side effects, possibly including the removal or replacement of
the custom error page. (CVE-2017-5664)

* Two vulnerabilities were discovered in Tomcat where if a servlet context
was configured with readonly=false and HTTP PUT requests were allowed, an
attacker could upload a JSP file to that context and achieve code
execution. (CVE-2017-12615, CVE-2017-12617)
--

SL6
  noarch
    tomcat6-6.0.24-111.el6_9.noarch.rpm
    tomcat6-admin-webapps-6.0.24-111.el6_9.noarch.rpm
    tomcat6-docs-webapp-6.0.24-111.el6_9.noarch.rpm
    tomcat6-el-2.1-api-6.0.24-111.el6_9.noarch.rpm
    tomcat6-javadoc-6.0.24-111.el6_9.noarch.rpm
    tomcat6-jsp-2.1-api-6.0.24-111.el6_9.noarch.rpm
    tomcat6-lib-6.0.24-111.el6_9.noarch.rpm
    tomcat6-servlet-2.5-api-6.0.24-111.el6_9.noarch.rpm
    tomcat6-webapps-6.0.24-111.el6_9.noarch.rpm

- Scientific Linux Development Team