Synopsis: Important: tomcat6 security update Advisory ID: SLSA-2017:3080-1 Issue Date: 2017-10-30 CVE Numbers: CVE-2017-5664 CVE-2017-5647 CVE-2017-12615 CVE-2017-12617 -- Security Fix(es): * A vulnerability was discovered in Tomcat's handling of pipelined requests when "Sendfile" was used. If sendfile processing completed quickly, it was possible for the Processor to be added to the processor cache twice. This could lead to invalid responses or information disclosure. (CVE-2017-5647) * A vulnerability was discovered in the error page mechanism in Tomcat's DefaultServlet implementation. A crafted HTTP request could cause undesired side effects, possibly including the removal or replacement of the custom error page. (CVE-2017-5664) * Two vulnerabilities were discovered in Tomcat where if a servlet context was configured with readonly=false and HTTP PUT requests were allowed, an attacker could upload a JSP file to that context and achieve code execution. (CVE-2017-12615, CVE-2017-12617) -- SL6 noarch tomcat6-6.0.24-111.el6_9.noarch.rpm tomcat6-admin-webapps-6.0.24-111.el6_9.noarch.rpm tomcat6-docs-webapp-6.0.24-111.el6_9.noarch.rpm tomcat6-el-2.1-api-6.0.24-111.el6_9.noarch.rpm tomcat6-javadoc-6.0.24-111.el6_9.noarch.rpm tomcat6-jsp-2.1-api-6.0.24-111.el6_9.noarch.rpm tomcat6-lib-6.0.24-111.el6_9.noarch.rpm tomcat6-servlet-2.5-api-6.0.24-111.el6_9.noarch.rpm tomcat6-webapps-6.0.24-111.el6_9.noarch.rpm - Scientific Linux Development Team