Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2013:0872 - Security Advisory
Issued:
2013-05-28
Updated:
2013-05-28

RHSA-2013:0872 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: tomcat5 and tomcat6 security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated tomcat5 and tomcat6 packages that fix one security issue are now
available for JBoss Enterprise Web Server 1.0.2 for Red Hat Enterprise
Linux 5 and 6.

The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.

Description

Apache Tomcat is a servlet container for the Java Servlet and JavaServer
Pages (JSP) technologies.

A flaw was found in the way the tomcat5 and tomcat6 init scripts handled
the tomcat5-initd.log and tomcat6-initd.log log files. A malicious web
application deployed on Tomcat could use this flaw to perform a symbolic
link attack to change the ownership of an arbitrary system file to that of
the tomcat user, allowing them to escalate their privileges to root.
(CVE-2013-1976)

Note: With this update, tomcat5-initd.log and tomcat6-initd.log have been
moved to the /var/log/ directory.

Red Hat would like to thank Simon Fayer of Imperial College London for
reporting this issue.

Warning: Before applying the update, back up your existing JBoss Enterprise
Web Server installation (including all applications and configuration
files).

Users of Tomcat should upgrade to these updated packages, which resolve
this issue. Tomcat must be restarted for this update to take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Affected Products

  • JBoss Enterprise Web Server 1 for RHEL 6 x86_64
  • JBoss Enterprise Web Server 1 for RHEL 6 i386
  • JBoss Enterprise Web Server 1 for RHEL 5 x86_64
  • JBoss Enterprise Web Server 1 for RHEL 5 i386

Fixes

  • BZ - 927622 - CVE-2013-1976 tomcat: Improper TOMCAT_LOG management in init script (DoS, ACE)

CVEs

  • CVE-2013-1976

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

JBoss Enterprise Web Server 1 for RHEL 6

SRPM
tomcat5-5.5.33-36_patch_09.ep5.el6.src.rpm SHA-256: 3b4c07dbe609e386971ee955e10f49c8330cc6f3aa1cfdff5423a6a624604703
tomcat6-6.0.32-35_patch_09.ep5.el6.src.rpm SHA-256: 67fde4ef0e2a9bef7e6c089019671eaf2c872b450a0527a8b38607e5bb689813
x86_64
tomcat5-5.5.33-36_patch_09.ep5.el6.noarch.rpm SHA-256: a7c6798d5188b16f291da4d9fdea10923fba9fba50abae029f96bf3c98288cc1
tomcat5-admin-webapps-5.5.33-36_patch_09.ep5.el6.noarch.rpm SHA-256: 7c94b805df583dd6c6713f18cca11fa71f44580773082bbba49cc8a1a829e80c
tomcat5-common-lib-5.5.33-36_patch_09.ep5.el6.noarch.rpm SHA-256: 6e40a7f3dba5aa04de3a9155f1c35a2123773af645dda72748a933035202c1a1
tomcat5-jasper-5.5.33-36_patch_09.ep5.el6.noarch.rpm SHA-256: 945f2c3c3427ad685a61e2424cf61d7d842cbadb745b4eaef3cac55d7ce2216d
tomcat5-jasper-eclipse-5.5.33-36_patch_09.ep5.el6.noarch.rpm SHA-256: 3d1a813096667fedbfdf22f27fa3e442bda33f41e46a60093a7ab3e3e9220739
tomcat5-jasper-javadoc-5.5.33-36_patch_09.ep5.el6.noarch.rpm SHA-256: 028487cd175edd25af2efca991b4364d545ba2bb6dfaf635572ff05f671ec07d
tomcat5-jsp-2.0-api-5.5.33-36_patch_09.ep5.el6.noarch.rpm SHA-256: d6ea3f15f8a1867e21b35df6ce6e14a8e0895358fec362f12df89e9a4a288e3c
tomcat5-jsp-2.0-api-javadoc-5.5.33-36_patch_09.ep5.el6.noarch.rpm SHA-256: 859b45315ca72504b05737f811733cc9c5747b4a2b1c770c904aab0344b4d54a
tomcat5-parent-5.5.33-36_patch_09.ep5.el6.noarch.rpm SHA-256: ab102f43695e208d154e88c0526873a2315afd9babb9908dd67dcb00698d69ce
tomcat5-server-lib-5.5.33-36_patch_09.ep5.el6.noarch.rpm SHA-256: 9b67a431ec7724866602fbba91fb93e0780415cf13f0f3fdf9e548200bd016cc
tomcat5-servlet-2.4-api-5.5.33-36_patch_09.ep5.el6.noarch.rpm SHA-256: 643e4831456fd7646ac717da40850822230fc3f940d0750fb1466317aa5752a8
tomcat5-servlet-2.4-api-javadoc-5.5.33-36_patch_09.ep5.el6.noarch.rpm SHA-256: c14be80864a171f0ecc971f3f3579d6aa7fe4373eb0631dcb1979a4a669e229d
tomcat5-webapps-5.5.33-36_patch_09.ep5.el6.noarch.rpm SHA-256: e6de770ae676c9255fb2c7366bce4f61300ed27b4abd66c03a876dcc53e60af4
tomcat6-6.0.32-35_patch_09.ep5.el6.noarch.rpm SHA-256: b02f717a1f0315e078887fea830ee1a7c5ea21c652da5f69320b02cda6fbccfa
tomcat6-admin-webapps-6.0.32-35_patch_09.ep5.el6.noarch.rpm SHA-256: 7d5766a1c072d52679760178cbdb03bbfd8adadec176aef8f45716ea95688d23
tomcat6-docs-webapp-6.0.32-35_patch_09.ep5.el6.noarch.rpm SHA-256: be6701a691533f6a1ea1bc9d7a1300c01e8cdbd35bd8fe5c2ef71b63d0a8c095
tomcat6-el-1.0-api-6.0.32-35_patch_09.ep5.el6.noarch.rpm SHA-256: 2a8a4398137ef54c06be4b78cfbbc5a0a24d4c87f1f9027ada157c6e4867a6a2
tomcat6-javadoc-6.0.32-35_patch_09.ep5.el6.noarch.rpm SHA-256: 8df00d71338ea3f71d769da540e0b8594dcff1e23ed49b166633a8d244b82423
tomcat6-jsp-2.1-api-6.0.32-35_patch_09.ep5.el6.noarch.rpm SHA-256: 5d090881250d9a05fe4b448a6281cd1060edb529ba86ee9365372de36c9153a5
tomcat6-lib-6.0.32-35_patch_09.ep5.el6.noarch.rpm SHA-256: 08a75f86c82c14f837bee07b54cd72af8bf86bd1094752cb2f2e8d2dba64c50e
tomcat6-log4j-6.0.32-35_patch_09.ep5.el6.noarch.rpm SHA-256: 2312a19d2143f3c5fbdaa4e0528026a878b677a8abe131e48f2e3d7b59577e03
tomcat6-servlet-2.5-api-6.0.32-35_patch_09.ep5.el6.noarch.rpm SHA-256: 49b3637d4dcda7168bb9483a3f59afc1240d61904ea8075fda48702beed6c49e
tomcat6-webapps-6.0.32-35_patch_09.ep5.el6.noarch.rpm SHA-256: 85d19388ac65e9cd0bad8683f2eab713efcfc26b448bd086918a0fae010999e6
i386
tomcat5-5.5.33-36_patch_09.ep5.el6.noarch.rpm SHA-256: a7c6798d5188b16f291da4d9fdea10923fba9fba50abae029f96bf3c98288cc1
tomcat5-admin-webapps-5.5.33-36_patch_09.ep5.el6.noarch.rpm SHA-256: 7c94b805df583dd6c6713f18cca11fa71f44580773082bbba49cc8a1a829e80c
tomcat5-common-lib-5.5.33-36_patch_09.ep5.el6.noarch.rpm SHA-256: 6e40a7f3dba5aa04de3a9155f1c35a2123773af645dda72748a933035202c1a1
tomcat5-jasper-5.5.33-36_patch_09.ep5.el6.noarch.rpm SHA-256: 945f2c3c3427ad685a61e2424cf61d7d842cbadb745b4eaef3cac55d7ce2216d
tomcat5-jasper-eclipse-5.5.33-36_patch_09.ep5.el6.noarch.rpm SHA-256: 3d1a813096667fedbfdf22f27fa3e442bda33f41e46a60093a7ab3e3e9220739
tomcat5-jasper-javadoc-5.5.33-36_patch_09.ep5.el6.noarch.rpm SHA-256: 028487cd175edd25af2efca991b4364d545ba2bb6dfaf635572ff05f671ec07d
tomcat5-jsp-2.0-api-5.5.33-36_patch_09.ep5.el6.noarch.rpm SHA-256: d6ea3f15f8a1867e21b35df6ce6e14a8e0895358fec362f12df89e9a4a288e3c
tomcat5-jsp-2.0-api-javadoc-5.5.33-36_patch_09.ep5.el6.noarch.rpm SHA-256: 859b45315ca72504b05737f811733cc9c5747b4a2b1c770c904aab0344b4d54a
tomcat5-parent-5.5.33-36_patch_09.ep5.el6.noarch.rpm SHA-256: ab102f43695e208d154e88c0526873a2315afd9babb9908dd67dcb00698d69ce
tomcat5-server-lib-5.5.33-36_patch_09.ep5.el6.noarch.rpm SHA-256: 9b67a431ec7724866602fbba91fb93e0780415cf13f0f3fdf9e548200bd016cc
tomcat5-servlet-2.4-api-5.5.33-36_patch_09.ep5.el6.noarch.rpm SHA-256: 643e4831456fd7646ac717da40850822230fc3f940d0750fb1466317aa5752a8
tomcat5-servlet-2.4-api-javadoc-5.5.33-36_patch_09.ep5.el6.noarch.rpm SHA-256: c14be80864a171f0ecc971f3f3579d6aa7fe4373eb0631dcb1979a4a669e229d
tomcat5-webapps-5.5.33-36_patch_09.ep5.el6.noarch.rpm SHA-256: e6de770ae676c9255fb2c7366bce4f61300ed27b4abd66c03a876dcc53e60af4
tomcat6-6.0.32-35_patch_09.ep5.el6.noarch.rpm SHA-256: b02f717a1f0315e078887fea830ee1a7c5ea21c652da5f69320b02cda6fbccfa
tomcat6-admin-webapps-6.0.32-35_patch_09.ep5.el6.noarch.rpm SHA-256: 7d5766a1c072d52679760178cbdb03bbfd8adadec176aef8f45716ea95688d23
tomcat6-docs-webapp-6.0.32-35_patch_09.ep5.el6.noarch.rpm SHA-256: be6701a691533f6a1ea1bc9d7a1300c01e8cdbd35bd8fe5c2ef71b63d0a8c095
tomcat6-el-1.0-api-6.0.32-35_patch_09.ep5.el6.noarch.rpm SHA-256: 2a8a4398137ef54c06be4b78cfbbc5a0a24d4c87f1f9027ada157c6e4867a6a2
tomcat6-javadoc-6.0.32-35_patch_09.ep5.el6.noarch.rpm SHA-256: 8df00d71338ea3f71d769da540e0b8594dcff1e23ed49b166633a8d244b82423
tomcat6-jsp-2.1-api-6.0.32-35_patch_09.ep5.el6.noarch.rpm SHA-256: 5d090881250d9a05fe4b448a6281cd1060edb529ba86ee9365372de36c9153a5
tomcat6-lib-6.0.32-35_patch_09.ep5.el6.noarch.rpm SHA-256: 08a75f86c82c14f837bee07b54cd72af8bf86bd1094752cb2f2e8d2dba64c50e
tomcat6-log4j-6.0.32-35_patch_09.ep5.el6.noarch.rpm SHA-256: 2312a19d2143f3c5fbdaa4e0528026a878b677a8abe131e48f2e3d7b59577e03
tomcat6-servlet-2.5-api-6.0.32-35_patch_09.ep5.el6.noarch.rpm SHA-256: 49b3637d4dcda7168bb9483a3f59afc1240d61904ea8075fda48702beed6c49e
tomcat6-webapps-6.0.32-35_patch_09.ep5.el6.noarch.rpm SHA-256: 85d19388ac65e9cd0bad8683f2eab713efcfc26b448bd086918a0fae010999e6

JBoss Enterprise Web Server 1 for RHEL 5

SRPM
tomcat5-5.5.33-33_patch_09.ep5.el5.src.rpm SHA-256: 569f3ccdf965f761f5a7b38c51d68a46bcba4c5b1dcffcc439a095636f641057
tomcat6-6.0.32-32_patch_09.ep5.el5.src.rpm SHA-256: b62c8a6adba7abc36c32e5bbde7305031cd5b4a7a87cc1383584b57983eb7fa4
x86_64
tomcat5-5.5.33-33_patch_09.ep5.el5.noarch.rpm SHA-256: 99db5bc3cf2ba9a1b4b16269d290ac5a699e0703e124779a52e87b5c1be74456
tomcat5-admin-webapps-5.5.33-33_patch_09.ep5.el5.noarch.rpm SHA-256: 12dc080fcd1f359825009feb022027b00a4fe87d4859bd074c0a81b2db6052fc
tomcat5-common-lib-5.5.33-33_patch_09.ep5.el5.noarch.rpm SHA-256: efdca680f4d6285cb8fd47b34526a0862a0fe5318ee2aea8587f9df6e4ec5fe4
tomcat5-jasper-5.5.33-33_patch_09.ep5.el5.noarch.rpm SHA-256: 09328afb0f24a6c8dd2c4023a88a425ee0ee2e0f90e21f1ceaf0032c8a617e3a
tomcat5-jasper-eclipse-5.5.33-33_patch_09.ep5.el5.noarch.rpm SHA-256: 56fa866eee0dcd32436fefcd1df29986d2aa619767408bbb4499f74765983506
tomcat5-jasper-javadoc-5.5.33-33_patch_09.ep5.el5.noarch.rpm SHA-256: 6a6ae61f50708e8563e1fe732637cd6098e276f45d84af7b8fb0829aae8b5d87
tomcat5-jsp-2.0-api-5.5.33-33_patch_09.ep5.el5.noarch.rpm SHA-256: 1a2ed3f9677bf3f0c3814c19d758d5d4f55fe3495f4eef20d85b47478bbf194a
tomcat5-jsp-2.0-api-javadoc-5.5.33-33_patch_09.ep5.el5.noarch.rpm SHA-256: e029442a4d1c09933590d565c79262d3b1235c33e9d9bbcd5f19de6fa156ea94
tomcat5-parent-5.5.33-33_patch_09.ep5.el5.noarch.rpm SHA-256: 531a87715df735bc92a0ff412bda7083a3b6794acdaa2e8640fe39f57d2acdf2
tomcat5-server-lib-5.5.33-33_patch_09.ep5.el5.noarch.rpm SHA-256: c04e0536e3ab8659408c9074f9f3c0a8678e7f5d644b227a1ff785d868aa4933
tomcat5-servlet-2.4-api-5.5.33-33_patch_09.ep5.el5.noarch.rpm SHA-256: 98eb46797d822a6db1f3acb81203c9dda10e53627bf86b9becaf46602aca6dcf
tomcat5-servlet-2.4-api-javadoc-5.5.33-33_patch_09.ep5.el5.noarch.rpm SHA-256: 970a0986b7d5b39945950cd060a6181d90c9550518f26cc1856ce2551cd8e182
tomcat5-webapps-5.5.33-33_patch_09.ep5.el5.noarch.rpm SHA-256: e42e2833cc5af14e8bf1236748a7cad55c28fde66d207e3316301c315bfc88c2
tomcat6-6.0.32-32_patch_09.ep5.el5.noarch.rpm SHA-256: ae1afd12e24944dfe04730bd3631e8cb21e4f8613f04fbdd71196bb192892f58
tomcat6-admin-webapps-6.0.32-32_patch_09.ep5.el5.noarch.rpm SHA-256: 0c72503b061f62df027569e204dcd22db814c023a27c31c32f785a41c5c0e0a2
tomcat6-docs-webapp-6.0.32-32_patch_09.ep5.el5.noarch.rpm SHA-256: d36b37fa2752dba4ab9a4fb7fcdb0b2cc5b941f71dfa30474700f4802b58698e
tomcat6-el-1.0-api-6.0.32-32_patch_09.ep5.el5.noarch.rpm SHA-256: 69652e256c4e9974f75eda8e3cb4aec44a7ad00783775dc3efbdfe0d7593db23
tomcat6-javadoc-6.0.32-32_patch_09.ep5.el5.noarch.rpm SHA-256: 335e5bda4c94671cf5c5ea966fe9fa2ce37f1d37709f7eb4b160589b70f53bcf
tomcat6-jsp-2.1-api-6.0.32-32_patch_09.ep5.el5.noarch.rpm SHA-256: 066cb504d8f1a9f2071106d466bab59e674ef065e007501a1d6810097c916cbd
tomcat6-lib-6.0.32-32_patch_09.ep5.el5.noarch.rpm SHA-256: 6e0cc408879ab8ce2c05c944082fb0cd20d9ed7f5c6ada4aea0b0fa63f1db26d
tomcat6-log4j-6.0.32-32_patch_09.ep5.el5.noarch.rpm SHA-256: eae07dad1cfd682fedb90ce5ff618eccc6abcf805ff4147e9a794c2033696a72
tomcat6-servlet-2.5-api-6.0.32-32_patch_09.ep5.el5.noarch.rpm SHA-256: 25ae89c1c8e33a21b8e76857c975688ab334781329dc1f27ab2e8ad61f5394d0
tomcat6-webapps-6.0.32-32_patch_09.ep5.el5.noarch.rpm SHA-256: 0ead3f04e8d237b5b621fdf7377625675f533c4340bf59e38034b2bca53abd1b
i386
tomcat5-5.5.33-33_patch_09.ep5.el5.noarch.rpm SHA-256: 99db5bc3cf2ba9a1b4b16269d290ac5a699e0703e124779a52e87b5c1be74456
tomcat5-admin-webapps-5.5.33-33_patch_09.ep5.el5.noarch.rpm SHA-256: 12dc080fcd1f359825009feb022027b00a4fe87d4859bd074c0a81b2db6052fc
tomcat5-common-lib-5.5.33-33_patch_09.ep5.el5.noarch.rpm SHA-256: efdca680f4d6285cb8fd47b34526a0862a0fe5318ee2aea8587f9df6e4ec5fe4
tomcat5-jasper-5.5.33-33_patch_09.ep5.el5.noarch.rpm SHA-256: 09328afb0f24a6c8dd2c4023a88a425ee0ee2e0f90e21f1ceaf0032c8a617e3a
tomcat5-jasper-eclipse-5.5.33-33_patch_09.ep5.el5.noarch.rpm SHA-256: 56fa866eee0dcd32436fefcd1df29986d2aa619767408bbb4499f74765983506
tomcat5-jasper-javadoc-5.5.33-33_patch_09.ep5.el5.noarch.rpm SHA-256: 6a6ae61f50708e8563e1fe732637cd6098e276f45d84af7b8fb0829aae8b5d87
tomcat5-jsp-2.0-api-5.5.33-33_patch_09.ep5.el5.noarch.rpm SHA-256: 1a2ed3f9677bf3f0c3814c19d758d5d4f55fe3495f4eef20d85b47478bbf194a
tomcat5-jsp-2.0-api-javadoc-5.5.33-33_patch_09.ep5.el5.noarch.rpm SHA-256: e029442a4d1c09933590d565c79262d3b1235c33e9d9bbcd5f19de6fa156ea94
tomcat5-parent-5.5.33-33_patch_09.ep5.el5.noarch.rpm SHA-256: 531a87715df735bc92a0ff412bda7083a3b6794acdaa2e8640fe39f57d2acdf2
tomcat5-server-lib-5.5.33-33_patch_09.ep5.el5.noarch.rpm SHA-256: c04e0536e3ab8659408c9074f9f3c0a8678e7f5d644b227a1ff785d868aa4933
tomcat5-servlet-2.4-api-5.5.33-33_patch_09.ep5.el5.noarch.rpm SHA-256: 98eb46797d822a6db1f3acb81203c9dda10e53627bf86b9becaf46602aca6dcf
tomcat5-servlet-2.4-api-javadoc-5.5.33-33_patch_09.ep5.el5.noarch.rpm SHA-256: 970a0986b7d5b39945950cd060a6181d90c9550518f26cc1856ce2551cd8e182
tomcat5-webapps-5.5.33-33_patch_09.ep5.el5.noarch.rpm SHA-256: e42e2833cc5af14e8bf1236748a7cad55c28fde66d207e3316301c315bfc88c2
tomcat6-6.0.32-32_patch_09.ep5.el5.noarch.rpm SHA-256: ae1afd12e24944dfe04730bd3631e8cb21e4f8613f04fbdd71196bb192892f58
tomcat6-admin-webapps-6.0.32-32_patch_09.ep5.el5.noarch.rpm SHA-256: 0c72503b061f62df027569e204dcd22db814c023a27c31c32f785a41c5c0e0a2
tomcat6-docs-webapp-6.0.32-32_patch_09.ep5.el5.noarch.rpm SHA-256: d36b37fa2752dba4ab9a4fb7fcdb0b2cc5b941f71dfa30474700f4802b58698e
tomcat6-el-1.0-api-6.0.32-32_patch_09.ep5.el5.noarch.rpm SHA-256: 69652e256c4e9974f75eda8e3cb4aec44a7ad00783775dc3efbdfe0d7593db23
tomcat6-javadoc-6.0.32-32_patch_09.ep5.el5.noarch.rpm SHA-256: 335e5bda4c94671cf5c5ea966fe9fa2ce37f1d37709f7eb4b160589b70f53bcf
tomcat6-jsp-2.1-api-6.0.32-32_patch_09.ep5.el5.noarch.rpm SHA-256: 066cb504d8f1a9f2071106d466bab59e674ef065e007501a1d6810097c916cbd
tomcat6-lib-6.0.32-32_patch_09.ep5.el5.noarch.rpm SHA-256: 6e0cc408879ab8ce2c05c944082fb0cd20d9ed7f5c6ada4aea0b0fa63f1db26d
tomcat6-log4j-6.0.32-32_patch_09.ep5.el5.noarch.rpm SHA-256: eae07dad1cfd682fedb90ce5ff618eccc6abcf805ff4147e9a794c2033696a72
tomcat6-servlet-2.5-api-6.0.32-32_patch_09.ep5.el5.noarch.rpm SHA-256: 25ae89c1c8e33a21b8e76857c975688ab334781329dc1f27ab2e8ad61f5394d0
tomcat6-webapps-6.0.32-32_patch_09.ep5.el5.noarch.rpm SHA-256: 0ead3f04e8d237b5b621fdf7377625675f533c4340bf59e38034b2bca53abd1b

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility