Descripción: | Description: The remote host is missing updates announced in advisory RHSA-2011:0335.
Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies.
A denial of service flaw was found in the way certain strings were converted to Double objects. A remote attacker could use this flaw to cause Tomcat to hang via a specially-crafted HTTP request. (CVE-2010-4476)
A flaw was found in the Tomcat NIO (Non-Blocking I/O) connector. A remote attacker could use this flaw to cause a denial of service (out-of-memory condition) via a specially-crafted request containing a large NIO buffer size request value. (CVE-2011-0534)
This update also fixes the following bug:
* A bug in the tomcat6 init script prevented additional Tomcat instances from starting. As well, running service tomcat6 start caused configuration options applied from /etc/sysconfig/tomcat6 to be overwritten with those from /etc/tomcat6/tomcat6.conf. With this update, multiple instances of Tomcat run as expected. (BZ#676922)
Users of Tomcat should upgrade to these updated packages, which contain backported patches to correct these issues. Tomcat must be restarted for this update to take effect.
Solution: Please note that this update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date
http://rhn.redhat.com/errata/RHSA-2011-0335.html http://tomcat.apache.org/security-6.html
Risk factor : Medium
CVSS Score: 5.0
|