Amazon Linux AMI Security Advisory: ALAS-2016-656
Advisory Release Date: 2016-03-10 16:30 Pacific
It was found that the expression language resolver evaluated expressions within a privileged code section. A malicious web application could use this flaw to bypass security manager protections. (CVE-2014-7810 )
It was found that Tomcat would keep connections open after processing requests with a large enough request body. A remote attacker could potentially use this flaw to exhaust the pool of available connections and preventing further, legitimate connections to the Tomcat server to be made. (CVE-2014-0230 )
Run yum update tomcat6 to update your system.