Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2008:0648 - Security Advisory
Issued:
2008-08-27
Updated:
2008-08-27

RHSA-2008:0648 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: tomcat security update

Type/Severity

Security Advisory: Important

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated tomcat packages that fix several security issues are now available
for Red Hat Enterprise Linux 5.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

Description

Apache Tomcat is a servlet container for the Java Servlet and JavaServer
Pages (JSP) technologies.

A cross-site scripting vulnerability was discovered in the
HttpServletResponse.sendError() method. A remote attacker could inject
arbitrary web script or HTML via forged HTTP headers. (CVE-2008-1232)

An additional cross-site scripting vulnerability was discovered in the host
manager application. A remote attacker could inject arbitrary web script or
HTML via the hostname parameter. (CVE-2008-1947)

A traversal vulnerability was discovered when using a RequestDispatcher
in combination with a servlet or JSP. A remote attacker could utilize a
specially-crafted request parameter to access protected web resources.
(CVE-2008-2370)

An additional traversal vulnerability was discovered when the
"allowLinking" and "URIencoding" settings were activated. A remote attacker
could use a UTF-8-encoded request to extend their privileges and obtain
local files accessible to the Tomcat process. (CVE-2008-2938)

Users of tomcat should upgrade to these updated packages, which contain
backported patches to resolve these issues.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.2 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.2 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.2 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.2 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.2 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 446393 - CVE-2008-1947 Tomcat host manager xss - name field
  • BZ - 456120 - CVE-2008-2938 tomcat Unicode directory traversal vulnerability
  • BZ - 457597 - CVE-2008-1232 tomcat: Cross-Site-Scripting enabled by sendError call
  • BZ - 457934 - CVE-2008-2370 tomcat RequestDispatcher information disclosure vulnerability

CVEs

  • CVE-2008-2938
  • CVE-2008-1947
  • CVE-2008-2370
  • CVE-2008-1232

References

  • http://www.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
tomcat5-5.5.23-0jpp.7.el5_2.1.src.rpm SHA-256: f144b1c14c38700e9242359ecd5368541071779a9123a44b39ab3c0c84f04ca7
x86_64
tomcat5-5.5.23-0jpp.7.el5_2.1.x86_64.rpm SHA-256: 19d7f7cfc4d12eb69224027e7fb9205318560c1109d17dcd8385dbc9365cbbb6
tomcat5-admin-webapps-5.5.23-0jpp.7.el5_2.1.x86_64.rpm SHA-256: 4e89f102507fea6eaa1de13284cdf95c9394ca9de838749ff709a023e0f58b2e
tomcat5-common-lib-5.5.23-0jpp.7.el5_2.1.x86_64.rpm SHA-256: 2b4daad85db8c7eb3d3f99b1d95c6f80e4f4cad64c1e0619234d541d5a54c70b
tomcat5-jasper-5.5.23-0jpp.7.el5_2.1.x86_64.rpm SHA-256: 86312a3bf0dc2faaa8ac67bb6b004f40736081811f9c88a887e3049ca766ad49
tomcat5-jasper-javadoc-5.5.23-0jpp.7.el5_2.1.x86_64.rpm SHA-256: ebbf2c1181349c7df0d163876a15cbf3317b7407e56de828dd1de712a7da3882
tomcat5-jsp-2.0-api-5.5.23-0jpp.7.el5_2.1.x86_64.rpm SHA-256: 7a4a325cc885a4db40a7e8530dd87f98f7a91ce0c3a1076c1f3e8187f7a0d2bb
tomcat5-jsp-2.0-api-javadoc-5.5.23-0jpp.7.el5_2.1.x86_64.rpm SHA-256: 61c59b8f38745d579803f8e527c8f321b8254c3cef9f0a1f4f79caa45adbe786
tomcat5-server-lib-5.5.23-0jpp.7.el5_2.1.x86_64.rpm SHA-256: 8af250c2cc498e2ec931dbb148f96bceff7963a03bd1a6f9b15932c955204494
tomcat5-servlet-2.4-api-5.5.23-0jpp.7.el5_2.1.x86_64.rpm SHA-256: c1c58797e6b82c18b6a86e041bc4a5d0420426bb36ed5deced6b4b7b773664e3
tomcat5-servlet-2.4-api-javadoc-5.5.23-0jpp.7.el5_2.1.x86_64.rpm SHA-256: 9df092f2592d816ed6ac639d1419c195a2fba169b64b95de9857475f240a53cb
tomcat5-webapps-5.5.23-0jpp.7.el5_2.1.x86_64.rpm SHA-256: b10415b6641397cd865a67676eb97d17b9b75158ab6c1a386ed2efc6d2b5b631
ia64
tomcat5-5.5.23-0jpp.7.el5_2.1.ia64.rpm SHA-256: a4e0bf6dceeeb3b2d4cd1a7c7b142f8dad4dca831f953d728ace5216878c4d0c
tomcat5-admin-webapps-5.5.23-0jpp.7.el5_2.1.ia64.rpm SHA-256: 9627cf9c470ee4de350cbbe8f919de40395f7f267da5f947254c768a0e9a8f13
tomcat5-common-lib-5.5.23-0jpp.7.el5_2.1.ia64.rpm SHA-256: b82b853a817ca119144f89526c00f37499f6613ea52000798a70a38f0321a38f
tomcat5-jasper-5.5.23-0jpp.7.el5_2.1.ia64.rpm SHA-256: 75c02f06f29e3ca2c611881744f2b635db0f119f303147800e42cb81116b961a
tomcat5-jasper-javadoc-5.5.23-0jpp.7.el5_2.1.ia64.rpm SHA-256: fc6fc731f34c294c8654dd7e00bb3500882e632bc518fb180681d4bce5f69ec6
tomcat5-jsp-2.0-api-5.5.23-0jpp.7.el5_2.1.ia64.rpm SHA-256: 7e46e124fce07febbd02c73589b03dae8ab4e28030f88c35976f161799a2d080
tomcat5-jsp-2.0-api-javadoc-5.5.23-0jpp.7.el5_2.1.ia64.rpm SHA-256: 08dc07433bc9b823a79c7dcc4e701fabc55bb4b46548cfccf196ca0396fb4b9e
tomcat5-server-lib-5.5.23-0jpp.7.el5_2.1.ia64.rpm SHA-256: 4a129720d78b46a3064da27de6d18696968b98e2d810e22666dd0439dd15f683
tomcat5-servlet-2.4-api-5.5.23-0jpp.7.el5_2.1.ia64.rpm SHA-256: dc28b4defa0e4387587ec212883e2f81550e54232d6381ef047189a84fb51c44
tomcat5-servlet-2.4-api-javadoc-5.5.23-0jpp.7.el5_2.1.ia64.rpm SHA-256: bd0e04bb57505691a9050e38a57624926d61dd15706014d27927d6b199877704
tomcat5-webapps-5.5.23-0jpp.7.el5_2.1.ia64.rpm SHA-256: 7f88b69d4547497e73aea9882f76c121a97c7a460afe22a01826070de26ef2c5
i386
tomcat5-5.5.23-0jpp.7.el5_2.1.i386.rpm SHA-256: adf323062961ff904cead323f2560043468235341daa52e0cbaf5b6bea37ddbd
tomcat5-admin-webapps-5.5.23-0jpp.7.el5_2.1.i386.rpm SHA-256: e616fd193e1a100df3f56bcecb268274a72e97b39bb5c7b9769fdb04d21b10fc
tomcat5-common-lib-5.5.23-0jpp.7.el5_2.1.i386.rpm SHA-256: 8fc577fbd9a11b247f468359af22289c3d043f46f942ed5960605fb5f970824d
tomcat5-jasper-5.5.23-0jpp.7.el5_2.1.i386.rpm SHA-256: eb8ac0ee1df048589a426bbe38605c6ad12a97c643d329a12e58ec0959c6b568
tomcat5-jasper-javadoc-5.5.23-0jpp.7.el5_2.1.i386.rpm SHA-256: fcb51572da42a499173395a78be324d1a2f97c7fb80f7f637d9966df9b580f06
tomcat5-jsp-2.0-api-5.5.23-0jpp.7.el5_2.1.i386.rpm SHA-256: 04e6959eba3872309546c4fc0fc27a2b87420c9c40a6046317a444f13266edbb
tomcat5-jsp-2.0-api-javadoc-5.5.23-0jpp.7.el5_2.1.i386.rpm SHA-256: a8b31206e1ef76ca4d251096a1607f5bdbfeee46f2deda87b04b280697ebc404
tomcat5-server-lib-5.5.23-0jpp.7.el5_2.1.i386.rpm SHA-256: e49c25ee7106ee149ae224a5393eecda54bbcbee399041d55f83e47a246eee10
tomcat5-servlet-2.4-api-5.5.23-0jpp.7.el5_2.1.i386.rpm SHA-256: 2f0c4c82a9410672fbd9d71c4045f9d39532cfb818b3fa60646f4c3bdd9f9ad7
tomcat5-servlet-2.4-api-javadoc-5.5.23-0jpp.7.el5_2.1.i386.rpm SHA-256: 79f33018bf8a479176473e2e67f35e2d90cbf09a1a842d51c9d30587eecaf857
tomcat5-webapps-5.5.23-0jpp.7.el5_2.1.i386.rpm SHA-256: d9dff4a53b82b780105ae5abe7dfc0f0225985c3e68bdadac38f076ba1cc0c1a

Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.2

SRPM
x86_64
ia64
i386

Red Hat Enterprise Linux Workstation 5

SRPM
tomcat5-5.5.23-0jpp.7.el5_2.1.src.rpm SHA-256: f144b1c14c38700e9242359ecd5368541071779a9123a44b39ab3c0c84f04ca7
x86_64
tomcat5-5.5.23-0jpp.7.el5_2.1.x86_64.rpm SHA-256: 19d7f7cfc4d12eb69224027e7fb9205318560c1109d17dcd8385dbc9365cbbb6
tomcat5-admin-webapps-5.5.23-0jpp.7.el5_2.1.x86_64.rpm SHA-256: 4e89f102507fea6eaa1de13284cdf95c9394ca9de838749ff709a023e0f58b2e
tomcat5-common-lib-5.5.23-0jpp.7.el5_2.1.x86_64.rpm SHA-256: 2b4daad85db8c7eb3d3f99b1d95c6f80e4f4cad64c1e0619234d541d5a54c70b
tomcat5-jasper-5.5.23-0jpp.7.el5_2.1.x86_64.rpm SHA-256: 86312a3bf0dc2faaa8ac67bb6b004f40736081811f9c88a887e3049ca766ad49
tomcat5-jasper-javadoc-5.5.23-0jpp.7.el5_2.1.x86_64.rpm SHA-256: ebbf2c1181349c7df0d163876a15cbf3317b7407e56de828dd1de712a7da3882
tomcat5-jsp-2.0-api-5.5.23-0jpp.7.el5_2.1.x86_64.rpm SHA-256: 7a4a325cc885a4db40a7e8530dd87f98f7a91ce0c3a1076c1f3e8187f7a0d2bb
tomcat5-jsp-2.0-api-javadoc-5.5.23-0jpp.7.el5_2.1.x86_64.rpm SHA-256: 61c59b8f38745d579803f8e527c8f321b8254c3cef9f0a1f4f79caa45adbe786
tomcat5-server-lib-5.5.23-0jpp.7.el5_2.1.x86_64.rpm SHA-256: 8af250c2cc498e2ec931dbb148f96bceff7963a03bd1a6f9b15932c955204494
tomcat5-servlet-2.4-api-5.5.23-0jpp.7.el5_2.1.x86_64.rpm SHA-256: c1c58797e6b82c18b6a86e041bc4a5d0420426bb36ed5deced6b4b7b773664e3
tomcat5-servlet-2.4-api-javadoc-5.5.23-0jpp.7.el5_2.1.x86_64.rpm SHA-256: 9df092f2592d816ed6ac639d1419c195a2fba169b64b95de9857475f240a53cb
tomcat5-webapps-5.5.23-0jpp.7.el5_2.1.x86_64.rpm SHA-256: b10415b6641397cd865a67676eb97d17b9b75158ab6c1a386ed2efc6d2b5b631
i386
tomcat5-5.5.23-0jpp.7.el5_2.1.i386.rpm SHA-256: adf323062961ff904cead323f2560043468235341daa52e0cbaf5b6bea37ddbd
tomcat5-admin-webapps-5.5.23-0jpp.7.el5_2.1.i386.rpm SHA-256: e616fd193e1a100df3f56bcecb268274a72e97b39bb5c7b9769fdb04d21b10fc
tomcat5-common-lib-5.5.23-0jpp.7.el5_2.1.i386.rpm SHA-256: 8fc577fbd9a11b247f468359af22289c3d043f46f942ed5960605fb5f970824d
tomcat5-jasper-5.5.23-0jpp.7.el5_2.1.i386.rpm SHA-256: eb8ac0ee1df048589a426bbe38605c6ad12a97c643d329a12e58ec0959c6b568
tomcat5-jasper-javadoc-5.5.23-0jpp.7.el5_2.1.i386.rpm SHA-256: fcb51572da42a499173395a78be324d1a2f97c7fb80f7f637d9966df9b580f06
tomcat5-jsp-2.0-api-5.5.23-0jpp.7.el5_2.1.i386.rpm SHA-256: 04e6959eba3872309546c4fc0fc27a2b87420c9c40a6046317a444f13266edbb
tomcat5-jsp-2.0-api-javadoc-5.5.23-0jpp.7.el5_2.1.i386.rpm SHA-256: a8b31206e1ef76ca4d251096a1607f5bdbfeee46f2deda87b04b280697ebc404
tomcat5-server-lib-5.5.23-0jpp.7.el5_2.1.i386.rpm SHA-256: e49c25ee7106ee149ae224a5393eecda54bbcbee399041d55f83e47a246eee10
tomcat5-servlet-2.4-api-5.5.23-0jpp.7.el5_2.1.i386.rpm SHA-256: 2f0c4c82a9410672fbd9d71c4045f9d39532cfb818b3fa60646f4c3bdd9f9ad7
tomcat5-servlet-2.4-api-javadoc-5.5.23-0jpp.7.el5_2.1.i386.rpm SHA-256: 79f33018bf8a479176473e2e67f35e2d90cbf09a1a842d51c9d30587eecaf857
tomcat5-webapps-5.5.23-0jpp.7.el5_2.1.i386.rpm SHA-256: d9dff4a53b82b780105ae5abe7dfc0f0225985c3e68bdadac38f076ba1cc0c1a

Red Hat Enterprise Linux Desktop 5

SRPM
tomcat5-5.5.23-0jpp.7.el5_2.1.src.rpm SHA-256: f144b1c14c38700e9242359ecd5368541071779a9123a44b39ab3c0c84f04ca7
x86_64
tomcat5-jsp-2.0-api-5.5.23-0jpp.7.el5_2.1.x86_64.rpm SHA-256: 7a4a325cc885a4db40a7e8530dd87f98f7a91ce0c3a1076c1f3e8187f7a0d2bb
tomcat5-servlet-2.4-api-5.5.23-0jpp.7.el5_2.1.x86_64.rpm SHA-256: c1c58797e6b82c18b6a86e041bc4a5d0420426bb36ed5deced6b4b7b773664e3
i386
tomcat5-jsp-2.0-api-5.5.23-0jpp.7.el5_2.1.i386.rpm SHA-256: 04e6959eba3872309546c4fc0fc27a2b87420c9c40a6046317a444f13266edbb
tomcat5-servlet-2.4-api-5.5.23-0jpp.7.el5_2.1.i386.rpm SHA-256: 2f0c4c82a9410672fbd9d71c4045f9d39532cfb818b3fa60646f4c3bdd9f9ad7

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
tomcat5-5.5.23-0jpp.7.el5_2.1.src.rpm SHA-256: f144b1c14c38700e9242359ecd5368541071779a9123a44b39ab3c0c84f04ca7
s390x
tomcat5-5.5.23-0jpp.7.el5_2.1.s390x.rpm SHA-256: ee75b389d68b1fabd7efd50ab7230ac0060dc0a693fd24959d11bcdb9e7ef54e
tomcat5-admin-webapps-5.5.23-0jpp.7.el5_2.1.s390x.rpm SHA-256: cb3a4f10598443b5855678cf394a28ea2a69c7cb10d167c75459d42689359682
tomcat5-common-lib-5.5.23-0jpp.7.el5_2.1.s390x.rpm SHA-256: 6931d2b802b6bf2e3dad633089b27939fdd6395add25ce477da3b4792b93c3a4
tomcat5-jasper-5.5.23-0jpp.7.el5_2.1.s390x.rpm SHA-256: 4824a19333fc3b9a13cf332367129337973f11afd0e484718f564d325dfac444
tomcat5-jasper-javadoc-5.5.23-0jpp.7.el5_2.1.s390x.rpm SHA-256: 8b96ceaef0b42e7d09cabeaba915bdde28128f280c23c70a9b5ba27d9113e784
tomcat5-jsp-2.0-api-5.5.23-0jpp.7.el5_2.1.s390x.rpm SHA-256: b075073c301fb25c72b6f0932ae2eca3119c5f88aec87d5f264f97c612c62fc8
tomcat5-jsp-2.0-api-javadoc-5.5.23-0jpp.7.el5_2.1.s390x.rpm SHA-256: cb7772f3cbbee39795cfb8653d6da380a97665de9e5575066399590cf10b7d2a
tomcat5-server-lib-5.5.23-0jpp.7.el5_2.1.s390x.rpm SHA-256: f5636b16697bf86f84b7d19dc3c2ae5d8444ca67584ca22d9f5c860998940dcf
tomcat5-servlet-2.4-api-5.5.23-0jpp.7.el5_2.1.s390x.rpm SHA-256: f150ba89918990f761371c7c6ff7655717cc7128c20553508432c4b87a3de155
tomcat5-servlet-2.4-api-javadoc-5.5.23-0jpp.7.el5_2.1.s390x.rpm SHA-256: b34ad4ded59d979ae490e2f9109e41b6ec18ae717af0db04a9db03ec264f044b
tomcat5-webapps-5.5.23-0jpp.7.el5_2.1.s390x.rpm SHA-256: 7fd2539818a85ebffd2cbbd742a7bdebfeed1e9721306e308ca2072ab7a280f5

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.2

SRPM
s390x

Red Hat Enterprise Linux for Power, big endian 5

SRPM
tomcat5-5.5.23-0jpp.7.el5_2.1.src.rpm SHA-256: f144b1c14c38700e9242359ecd5368541071779a9123a44b39ab3c0c84f04ca7
ppc
tomcat5-5.5.23-0jpp.7.el5_2.1.ppc.rpm SHA-256: e62af6eea66709aa9ed0f627bae8362495652a9f2535c5b7bc798930def475ba
tomcat5-5.5.23-0jpp.7.el5_2.1.ppc64.rpm SHA-256: cbc33a0d451358f7162a54cd987eab77fd42bce689a4dd452f7f7ad1dc95f53f
tomcat5-admin-webapps-5.5.23-0jpp.7.el5_2.1.ppc.rpm SHA-256: b1dcda7756117853010ef02e6771fb8f614ee09b37b34739566cc2b2583caece
tomcat5-common-lib-5.5.23-0jpp.7.el5_2.1.ppc.rpm SHA-256: 78d75aa5f1a30a7178ca3000f642299654d52c134c4d25cc5b9c5cb2991d845a
tomcat5-jasper-5.5.23-0jpp.7.el5_2.1.ppc.rpm SHA-256: f4e34f4e221981e53513430466d26de9784cd4b50687dc0310c256e1675578e4
tomcat5-jasper-javadoc-5.5.23-0jpp.7.el5_2.1.ppc.rpm SHA-256: 585050835479cc81a0140b58dd42beb09426d3d746ac4a43eac9b01bc097d9da
tomcat5-jsp-2.0-api-5.5.23-0jpp.7.el5_2.1.ppc.rpm SHA-256: 065da1d7f2ffb20873f15a9b72000d93af78fa3a0b2c1f25ddd77d8dc048c3f3
tomcat5-jsp-2.0-api-javadoc-5.5.23-0jpp.7.el5_2.1.ppc.rpm SHA-256: 1b6275ab1b24d473a8d4047662dab5fb9d7f4b315733f1786bb94bf7d7b50be4
tomcat5-server-lib-5.5.23-0jpp.7.el5_2.1.ppc.rpm SHA-256: da2d417ce9cff527f094104112908d96ffc0b3a18944cbb44a0b8f411e3bffd3
tomcat5-servlet-2.4-api-5.5.23-0jpp.7.el5_2.1.ppc.rpm SHA-256: 619c4cbf498235b5a3e9c46362d0c4eaccd4db076b394ce9cac0122147a4337b
tomcat5-servlet-2.4-api-javadoc-5.5.23-0jpp.7.el5_2.1.ppc.rpm SHA-256: 8aca17534264bdea92bcec1f5d0072e267a9fd4528bbcedc4bf2b801c9b15d73
tomcat5-webapps-5.5.23-0jpp.7.el5_2.1.ppc.rpm SHA-256: 71cb0cdc5bfa4f0de3211ad86eda1045c11d8b6db95b3692674da309a2d462ec

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.2

SRPM
ppc

Red Hat Enterprise Linux Server from RHUI 5

SRPM
tomcat5-5.5.23-0jpp.7.el5_2.1.src.rpm SHA-256: f144b1c14c38700e9242359ecd5368541071779a9123a44b39ab3c0c84f04ca7
x86_64
tomcat5-5.5.23-0jpp.7.el5_2.1.x86_64.rpm SHA-256: 19d7f7cfc4d12eb69224027e7fb9205318560c1109d17dcd8385dbc9365cbbb6
tomcat5-admin-webapps-5.5.23-0jpp.7.el5_2.1.x86_64.rpm SHA-256: 4e89f102507fea6eaa1de13284cdf95c9394ca9de838749ff709a023e0f58b2e
tomcat5-common-lib-5.5.23-0jpp.7.el5_2.1.x86_64.rpm SHA-256: 2b4daad85db8c7eb3d3f99b1d95c6f80e4f4cad64c1e0619234d541d5a54c70b
tomcat5-jasper-5.5.23-0jpp.7.el5_2.1.x86_64.rpm SHA-256: 86312a3bf0dc2faaa8ac67bb6b004f40736081811f9c88a887e3049ca766ad49
tomcat5-jasper-javadoc-5.5.23-0jpp.7.el5_2.1.x86_64.rpm SHA-256: ebbf2c1181349c7df0d163876a15cbf3317b7407e56de828dd1de712a7da3882
tomcat5-jsp-2.0-api-5.5.23-0jpp.7.el5_2.1.x86_64.rpm SHA-256: 7a4a325cc885a4db40a7e8530dd87f98f7a91ce0c3a1076c1f3e8187f7a0d2bb
tomcat5-jsp-2.0-api-javadoc-5.5.23-0jpp.7.el5_2.1.x86_64.rpm SHA-256: 61c59b8f38745d579803f8e527c8f321b8254c3cef9f0a1f4f79caa45adbe786
tomcat5-server-lib-5.5.23-0jpp.7.el5_2.1.x86_64.rpm SHA-256: 8af250c2cc498e2ec931dbb148f96bceff7963a03bd1a6f9b15932c955204494
tomcat5-servlet-2.4-api-5.5.23-0jpp.7.el5_2.1.x86_64.rpm SHA-256: c1c58797e6b82c18b6a86e041bc4a5d0420426bb36ed5deced6b4b7b773664e3
tomcat5-servlet-2.4-api-javadoc-5.5.23-0jpp.7.el5_2.1.x86_64.rpm SHA-256: 9df092f2592d816ed6ac639d1419c195a2fba169b64b95de9857475f240a53cb
tomcat5-webapps-5.5.23-0jpp.7.el5_2.1.x86_64.rpm SHA-256: b10415b6641397cd865a67676eb97d17b9b75158ab6c1a386ed2efc6d2b5b631
i386
tomcat5-5.5.23-0jpp.7.el5_2.1.i386.rpm SHA-256: adf323062961ff904cead323f2560043468235341daa52e0cbaf5b6bea37ddbd
tomcat5-admin-webapps-5.5.23-0jpp.7.el5_2.1.i386.rpm SHA-256: e616fd193e1a100df3f56bcecb268274a72e97b39bb5c7b9769fdb04d21b10fc
tomcat5-common-lib-5.5.23-0jpp.7.el5_2.1.i386.rpm SHA-256: 8fc577fbd9a11b247f468359af22289c3d043f46f942ed5960605fb5f970824d
tomcat5-jasper-5.5.23-0jpp.7.el5_2.1.i386.rpm SHA-256: eb8ac0ee1df048589a426bbe38605c6ad12a97c643d329a12e58ec0959c6b568
tomcat5-jasper-javadoc-5.5.23-0jpp.7.el5_2.1.i386.rpm SHA-256: fcb51572da42a499173395a78be324d1a2f97c7fb80f7f637d9966df9b580f06
tomcat5-jsp-2.0-api-5.5.23-0jpp.7.el5_2.1.i386.rpm SHA-256: 04e6959eba3872309546c4fc0fc27a2b87420c9c40a6046317a444f13266edbb
tomcat5-jsp-2.0-api-javadoc-5.5.23-0jpp.7.el5_2.1.i386.rpm SHA-256: a8b31206e1ef76ca4d251096a1607f5bdbfeee46f2deda87b04b280697ebc404
tomcat5-server-lib-5.5.23-0jpp.7.el5_2.1.i386.rpm SHA-256: e49c25ee7106ee149ae224a5393eecda54bbcbee399041d55f83e47a246eee10
tomcat5-servlet-2.4-api-5.5.23-0jpp.7.el5_2.1.i386.rpm SHA-256: 2f0c4c82a9410672fbd9d71c4045f9d39532cfb818b3fa60646f4c3bdd9f9ad7
tomcat5-servlet-2.4-api-javadoc-5.5.23-0jpp.7.el5_2.1.i386.rpm SHA-256: 79f33018bf8a479176473e2e67f35e2d90cbf09a1a842d51c9d30587eecaf857
tomcat5-webapps-5.5.23-0jpp.7.el5_2.1.i386.rpm SHA-256: d9dff4a53b82b780105ae5abe7dfc0f0225985c3e68bdadac38f076ba1cc0c1a

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility