Amazon Linux 1 Security Advisory: ALAS-2016-656
Advisory Release Date: 2016-03-10 16:30 Pacific
Advisory Updated Date: 2016-03-10 16:30 Pacific
It was found that the expression language resolver evaluated expressions within a privileged code section. A malicious web application could use this flaw to bypass security manager protections. (CVE-2014-7810)
It was found that Tomcat would keep connections open after processing requests with a large enough request body. A remote attacker could potentially use this flaw to exhaust the pool of available connections and preventing further, legitimate connections to the Tomcat server to be made. (CVE-2014-0230)
Affected Packages:
tomcat6
Issue Correction:
Run yum update tomcat6 to update your system.
noarch:
tomcat6-el-2.1-api-6.0.44-1.3.amzn1.noarch
tomcat6-6.0.44-1.3.amzn1.noarch
tomcat6-lib-6.0.44-1.3.amzn1.noarch
tomcat6-servlet-2.5-api-6.0.44-1.3.amzn1.noarch
tomcat6-admin-webapps-6.0.44-1.3.amzn1.noarch
tomcat6-javadoc-6.0.44-1.3.amzn1.noarch
tomcat6-jsp-2.1-api-6.0.44-1.3.amzn1.noarch
tomcat6-webapps-6.0.44-1.3.amzn1.noarch
tomcat6-docs-webapp-6.0.44-1.3.amzn1.noarch
src:
tomcat6-6.0.44-1.3.amzn1.src