Author: markt
Date: Mon Mar 13 20:04:51 2017
New Revision: 1786781

URL: http://svn.apache.org/viewvc?rev=1786781&view=rev
Log:
Announce CVE-2017-8747

Modified:
    tomcat/site/trunk/docs/security-8.html
    tomcat/site/trunk/docs/security-9.html
    tomcat/site/trunk/xdocs/security-8.xml
    tomcat/site/trunk/xdocs/security-9.xml

Modified: tomcat/site/trunk/docs/security-8.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-8.html?rev=1786781&r1=1786780&r2=1786781&view=diff
==============================================================================
--- tomcat/site/trunk/docs/security-8.html (original)
+++ tomcat/site/trunk/docs/security-8.html Mon Mar 13 20:04:51 2017
@@ -227,6 +227,9 @@
 <a href="#Apache_Tomcat_8.x_vulnerabilities">Apache Tomcat 8.x 
vulnerabilities</a>
 </li>
 <li>
+<a href="#Fixed_in_Apache_Tomcat_8.5.11">Fixed in Apache Tomcat 8.5.11</a>
+</li>
+<li>
 <a href="#Fixed_in_Apache_Tomcat_8.0.41">Fixed in Apache Tomcat 8.0.41</a>
 </li>
 <li>
@@ -326,6 +329,44 @@
 
   
 </div>
+<h3 id="Fixed_in_Apache_Tomcat_8.5.11">
+<span style="float: right;">16 January 2017</span> Fixed in Apache Tomcat 
8.5.11</h3>
+<div class="text">
+
+    
+<p>
+<i>Note: The issue below was fixed in Apache Tomcat 8.5.10 but the
+       release vote for the 8.5.10 release candidate did not pass. Therefore,
+       although users must download 8.5.11 to obtain a version that includes
+       the fix for this issue, version 8.5.10 is not included in the list of
+       affected versions.</i>
+</p>
+
+  
+<p>
+<strong>Moderate: Information Disclosure</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8747"; 
rel="nofollow">CVE-2017-8747</a>
+</p>
+
+    
+<p>The refactoring to make wider use of ByteBuffer introduced a regression
+       that could cause information to leak between requests on the same
+       connection. When running behind a reverse proxy, this could result in
+       information leakage between users. All HTTP connector variants are
+       affected but HTTP/2 and AJP are not affected.</p>
+
+    
+<p>This was fixed in revision <a 
href="http://svn.apache.org/viewvc?view=rev&amp;rev=1774166";>1774166</a>.</p>
+
+    
+<p>This issue was identified by the Apache Tomcat Security Team on 14
+       December 2016 and made public on 13 March 2017.</p>
+
+    
+<p>Affects: 8.5.7 to 8.5.9</p>
+
+  
+</div>
 <h3 id="Fixed_in_Apache_Tomcat_8.0.41">
 <span style="float: right;">24 January 2017</span> Fixed in Apache Tomcat 
8.0.41</h3>
 <div class="text">

Modified: tomcat/site/trunk/docs/security-9.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-9.html?rev=1786781&r1=1786780&r2=1786781&view=diff
==============================================================================
--- tomcat/site/trunk/docs/security-9.html (original)
+++ tomcat/site/trunk/docs/security-9.html Mon Mar 13 20:04:51 2017
@@ -227,6 +227,9 @@
 <a href="#Apache_Tomcat_9.x_vulnerabilities">Apache Tomcat 9.x 
vulnerabilities</a>
 </li>
 <li>
+<a href="#Fixed_in_Apache_Tomcat_9.0.0.M17">Fixed in Apache Tomcat 
9.0.0.M17</a>
+</li>
+<li>
 <a href="#Fixed_in_Apache_Tomcat_9.0.0.M15">Fixed in Apache Tomcat 
9.0.0.M15</a>
 </li>
 <li>
@@ -290,6 +293,44 @@
 
   
 </div>
+<h3 id="Fixed_in_Apache_Tomcat_9.0.0.M17">
+<span style="float: right;">16 January 2017</span> Fixed in Apache Tomcat 
9.0.0.M17</h3>
+<div class="text">
+
+    
+<p>
+<i>Note: The issue below was fixed in Apache Tomcat 9.0.0.M16 but the
+       release vote for the 9.0.0.M16 release candidate did not pass. 
Therefore,
+       although users must download 9.0.0.M17 to obtain a version that includes
+       the fix for this issue, version 9.0.0.M16 is not included in the list of
+       affected versions.</i>
+</p>
+
+  
+<p>
+<strong>Moderate: Information Disclosure</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8747"; 
rel="nofollow">CVE-2017-8747</a>
+</p>
+
+    
+<p>The refactoring to make wider use of ByteBuffer introduced a regression
+       that could cause information to leak between requests on the same
+       connection. When running behind a reverse proxy, this could result in
+       information leakage between users. All HTTP connector variants are
+       affected but HTTP/2 and AJP are not affected.</p>
+
+    
+<p>This was fixed in revision <a 
href="http://svn.apache.org/viewvc?view=rev&amp;rev=1774161";>1774161</a>.</p>
+
+    
+<p>This issue was identified by the Apache Tomcat Security Team on 14
+       December 2016 and made public on 13 March 2017.</p>
+
+    
+<p>Affects: 9.0.0.M11 to 9.0.0.M15</p>
+
+  
+</div>
 <h3 id="Fixed_in_Apache_Tomcat_9.0.0.M15">
 <span style="float: right;">8 December 2016</span> Fixed in Apache Tomcat 
9.0.0.M15</h3>
 <div class="text">

Modified: tomcat/site/trunk/xdocs/security-8.xml
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-8.xml?rev=1786781&r1=1786780&r2=1786781&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/security-8.xml (original)
+++ tomcat/site/trunk/xdocs/security-8.xml Mon Mar 13 20:04:51 2017
@@ -50,6 +50,32 @@
 
   </section>
 
+  <section name="Fixed in Apache Tomcat 8.5.11" rtext="16 January 2017">
+
+    <p><i>Note: The issue below was fixed in Apache Tomcat 8.5.10 but the
+       release vote for the 8.5.10 release candidate did not pass. Therefore,
+       although users must download 8.5.11 to obtain a version that includes
+       the fix for this issue, version 8.5.10 is not included in the list of
+       affected versions.</i></p>
+
+  <p><strong>Moderate: Information Disclosure</strong>
+       <cve>CVE-2017-8747</cve></p>
+
+    <p>The refactoring to make wider use of ByteBuffer introduced a regression
+       that could cause information to leak between requests on the same
+       connection. When running behind a reverse proxy, this could result in
+       information leakage between users. All HTTP connector variants are
+       affected but HTTP/2 and AJP are not affected.</p>
+
+    <p>This was fixed in revision <revlink rev="1774166">1774166</revlink>.</p>
+
+    <p>This issue was identified by the Apache Tomcat Security Team on 14
+       December 2016 and made public on 13 March 2017.</p>
+
+    <p>Affects: 8.5.7 to 8.5.9</p>
+
+  </section>
+  
   <section name="Fixed in Apache Tomcat 8.0.41" rtext="24 January 2017">
 
     <p><i>Note: The issue below was fixed in Apache Tomcat 8.0.40 but the

Modified: tomcat/site/trunk/xdocs/security-9.xml
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-9.xml?rev=1786781&r1=1786780&r2=1786781&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/security-9.xml (original)
+++ tomcat/site/trunk/xdocs/security-9.xml Mon Mar 13 20:04:51 2017
@@ -50,6 +50,32 @@
 
   </section>
 
+  <section name="Fixed in Apache Tomcat 9.0.0.M17" rtext="16 January 2017">
+
+    <p><i>Note: The issue below was fixed in Apache Tomcat 9.0.0.M16 but the
+       release vote for the 9.0.0.M16 release candidate did not pass. 
Therefore,
+       although users must download 9.0.0.M17 to obtain a version that includes
+       the fix for this issue, version 9.0.0.M16 is not included in the list of
+       affected versions.</i></p>
+
+  <p><strong>Moderate: Information Disclosure</strong>
+       <cve>CVE-2017-8747</cve></p>
+
+    <p>The refactoring to make wider use of ByteBuffer introduced a regression
+       that could cause information to leak between requests on the same
+       connection. When running behind a reverse proxy, this could result in
+       information leakage between users. All HTTP connector variants are
+       affected but HTTP/2 and AJP are not affected.</p>
+
+    <p>This was fixed in revision <revlink rev="1774161">1774161</revlink>.</p>
+
+    <p>This issue was identified by the Apache Tomcat Security Team on 14
+       December 2016 and made public on 13 March 2017.</p>
+
+    <p>Affects: 9.0.0.M11 to 9.0.0.M15</p>
+
+  </section>
+  
   <section name="Fixed in Apache Tomcat 9.0.0.M15" rtext="8 December 2016">
 
     <p><i>Note: The issue below was fixed in Apache Tomcat 9.0.0.M14 but the



---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org

Reply via email to