Author: markt
Date: Wed Jan 31 10:21:58 2018
New Revision: 1822784

URL: http://svn.apache.org/viewvc?rev=1822784&view=rev
Log:
Make CVE-2017-15698 and CVE-2017-15706 public

Modified:
    tomcat/site/trunk/docs/security-7.html
    tomcat/site/trunk/docs/security-8.html
    tomcat/site/trunk/docs/security-9.html
    tomcat/site/trunk/docs/security-native.html
    tomcat/site/trunk/xdocs/security-7.xml
    tomcat/site/trunk/xdocs/security-8.xml
    tomcat/site/trunk/xdocs/security-9.xml
    tomcat/site/trunk/xdocs/security-native.xml

Modified: tomcat/site/trunk/docs/security-7.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-7.html?rev=1822784&r1=1822783&r2=1822784&view=diff
==============================================================================
--- tomcat/site/trunk/docs/security-7.html (original)
+++ tomcat/site/trunk/docs/security-7.html Wed Jan 31 10:21:58 2018
@@ -208,6 +208,9 @@
 <a href="#Apache_Tomcat_7.x_vulnerabilities">Apache Tomcat 7.x 
vulnerabilities</a>
 </li>
 <li>
+<a href="#Fixed_in_Apache_Tomcat_7.0.84">Fixed in Apache Tomcat 7.0.84</a>
+</li>
+<li>
 <a href="#Fixed_in_Apache_Tomcat_7.0.82">Fixed in Apache Tomcat 7.0.82</a>
 </li>
 <li>
@@ -373,6 +376,46 @@
 
   
 </div>
+<h3 id="Fixed_in_Apache_Tomcat_7.0.84">
+<span class="pull-right">24 January 2018</span> Fixed in Apache Tomcat 
7.0.84</h3>
+<div class="text">
+
+    
+<p>
+<strong>Low: Incorrectly documented CGI search algorithm</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15706"; 
rel="nofollow">CVE-2017-15706</a>
+</p>
+
+    
+<p>
+<i>Note: The issue below was fixed in Apache Tomcat 7.0.83 but the
+       release vote for the 7.0.83 release candidate did not pass. Therefore,
+       although users must download 7.0.84 to obtain a version that includes
+       the fix for this issue, version 7.0.83 is not included in the list of
+       affected versions.</i>
+</p>
+
+    
+<p>As part of the fix for bug <a 
href="https://bz.apache.org/bugzilla/show_bug.cgi?id=61201";>61201</a>, the 
description of the
+       search algorithm used by the CGI Servlet to identify which script to
+       execute was updated. The update was not correct. As a result, some
+       scripts may have failed to execute as expected and other scripts may 
have
+       been executed unexpectedly. Note that the behaviour of the CGI servlet
+       has remained unchanged in this regard. It is only the documentation of
+       the behaviour that was wrong and has been corrected.</p>
+
+    
+<p>This was fixed in revision <a 
href="http://svn.apache.org/viewvc?view=rev&amp;rev=1814828";>1814828</a>.</p>
+
+    
+<p>This issue was reported to the Apache Tomcat Security Team by Michael
+       Grenier on 17 September 2017 and made public on 31 January 2018.</p>
+
+    
+<p>Affects: 7.0.79 to 7.0.82</p>
+
+  
+</div>
 <h3 id="Fixed_in_Apache_Tomcat_7.0.82">
 <span class="pull-right">4 October 2017</span> Fixed in Apache Tomcat 
7.0.82</h3>
 <div class="text">

Modified: tomcat/site/trunk/docs/security-8.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-8.html?rev=1822784&r1=1822783&r2=1822784&view=diff
==============================================================================
--- tomcat/site/trunk/docs/security-8.html (original)
+++ tomcat/site/trunk/docs/security-8.html Wed Jan 31 10:21:58 2018
@@ -208,6 +208,12 @@
 <a href="#Apache_Tomcat_8.x_vulnerabilities">Apache Tomcat 8.x 
vulnerabilities</a>
 </li>
 <li>
+<a href="#Fixed_in_Apache_Tomcat_8.0.48">Fixed in Apache Tomcat 8.0.48</a>
+</li>
+<li>
+<a href="#Fixed_in_Apache_Tomcat_8.5.24">Fixed in Apache Tomcat 8.5.24</a>
+</li>
+<li>
 <a href="#Fixed_in_Apache_Tomcat_8.0.47">Fixed in Apache Tomcat 8.0.47</a>
 </li>
 <li>
@@ -340,6 +346,68 @@
 
   
 </div>
+<h3 id="Fixed_in_Apache_Tomcat_8.0.48">
+<span class="pull-right">12 December 2017</span> Fixed in Apache Tomcat 
8.0.48</h3>
+<div class="text">
+
+    
+<p>
+<strong>Low: Incorrectly documented CGI search algorithm</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15706"; 
rel="nofollow">CVE-2017-15706</a>
+</p>
+
+    
+<p>As part of the fix for bug <a 
href="https://bz.apache.org/bugzilla/show_bug.cgi?id=61201";>61201</a>, the 
description of the
+       search algorithm used by the CGI Servlet to identify which script to
+       execute was updated. The update was not correct. As a result, some
+       scripts may have failed to execute as expected and other scripts may 
have
+       been executed unexpectedly. Note that the behaviour of the CGI servlet
+       has remained unchanged in this regard. It is only the documentation of
+       the behaviour that was wrong and has been corrected.</p>
+
+    
+<p>This was fixed in revision <a 
href="http://svn.apache.org/viewvc?view=rev&amp;rev=1814827";>1814827</a>.</p>
+
+    
+<p>This issue was reported to the Apache Tomcat Security Team by Michael
+       Grenier on 17 September 2017 and made public on 31 January 2018.</p>
+
+    
+<p>Affects: 8.0.45 to 8.0.47</p>
+
+  
+</div>
+<h3 id="Fixed_in_Apache_Tomcat_8.5.24">
+<span class="pull-right">30 November 2017</span> Fixed in Apache Tomcat 
8.5.24</h3>
+<div class="text">
+
+    
+<p>
+<strong>Low: Incorrectly documented CGI search algorithm</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15706"; 
rel="nofollow">CVE-2017-15706</a>
+</p>
+
+    
+<p>As part of the fix for bug <a 
href="https://bz.apache.org/bugzilla/show_bug.cgi?id=61201";>61201</a>, the 
description of the
+       search algorithm used by the CGI Servlet to identify which script to
+       execute was updated. The update was not correct. As a result, some
+       scripts may have failed to execute as expected and other scripts may 
have
+       been executed unexpectedly. Note that the behaviour of the CGI servlet
+       has remained unchanged in this regard. It is only the documentation of
+       the behaviour that was wrong and has been corrected.</p>
+
+    
+<p>This was fixed in revision <a 
href="http://svn.apache.org/viewvc?view=rev&amp;rev=1814826";>1814826</a>.</p>
+
+    
+<p>This issue was reported to the Apache Tomcat Security Team by Michael
+       Grenier on 17 September 2017 and made public on 31 January 2018.</p>
+
+    
+<p>Affects: 8.5.16 to 8.5.23</p>
+
+  
+</div>
 <h3 id="Fixed_in_Apache_Tomcat_8.0.47">
 <span class="pull-right">4 October 2017</span> Fixed in Apache Tomcat 
8.0.47</h3>
 <div class="text">

Modified: tomcat/site/trunk/docs/security-9.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-9.html?rev=1822784&r1=1822783&r2=1822784&view=diff
==============================================================================
--- tomcat/site/trunk/docs/security-9.html (original)
+++ tomcat/site/trunk/docs/security-9.html Wed Jan 31 10:21:58 2018
@@ -208,6 +208,9 @@
 <a href="#Apache_Tomcat_9.x_vulnerabilities">Apache Tomcat 9.x 
vulnerabilities</a>
 </li>
 <li>
+<a href="#Fixed_in_Apache_Tomcat_9.0.2">Fixed in Apache Tomcat 9.0.2</a>
+</li>
+<li>
 <a href="#Fixed_in_Apache_Tomcat_9.0.1">Fixed in Apache Tomcat 9.0.1</a>
 </li>
 <li>
@@ -289,6 +292,37 @@
 
   
 </div>
+<h3 id="Fixed_in_Apache_Tomcat_9.0.2">
+<span class="pull-right">30 November 2017</span> Fixed in Apache Tomcat 
9.0.2</h3>
+<div class="text">
+
+    
+<p>
+<strong>Low: Incorrectly documented CGI search algorithm</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15706"; 
rel="nofollow">CVE-2017-15706</a>
+</p>
+
+    
+<p>As part of the fix for bug <a 
href="https://bz.apache.org/bugzilla/show_bug.cgi?id=61201";>61201</a>, the 
description of the
+       search algorithm used by the CGI Servlet to identify which script to
+       execute was updated. The update was not correct. As a result, some
+       scripts may have failed to execute as expected and other scripts may 
have
+       been executed unexpectedly. Note that the behaviour of the CGI servlet
+       has remained unchanged in this regard. It is only the documentation of
+       the behaviour that was wrong and has been corrected.</p>
+
+    
+<p>This was fixed in revision <a 
href="http://svn.apache.org/viewvc?view=rev&amp;rev=1814825";>1814825</a>.</p>
+
+    
+<p>This issue was reported to the Apache Tomcat Security Team by Michael
+       Grenier on 17 September 2017 and made public on 31 January 2018.</p>
+
+    
+<p>Affects: 9.0.0.M22 to 9.0.1</p>
+
+  
+</div>
 <h3 id="Fixed_in_Apache_Tomcat_9.0.1">
 <span class="pull-right">30 September 2017</span> Fixed in Apache Tomcat 
9.0.1</h3>
 <div class="text">

Modified: tomcat/site/trunk/docs/security-native.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-native.html?rev=1822784&r1=1822783&r2=1822784&view=diff
==============================================================================
--- tomcat/site/trunk/docs/security-native.html (original)
+++ tomcat/site/trunk/docs/security-native.html Wed Jan 31 10:21:58 2018
@@ -208,6 +208,9 @@
 <a href="#Apache_Tomcat_APR/native_Connector_vulnerabilities">Apache Tomcat 
APR/native Connector vulnerabilities</a>
 </li>
 <li>
+<a href="#Fixed_in_Apache_Tomcat_Native_Connector_1.2.16">Fixed in Apache 
Tomcat Native Connector 1.2.16</a>
+</li>
+<li>
 <a href="#Not_a_vulnerability_in_the_Apache_Tomcat_APR/native_Connector">Not a 
vulnerability in the Apache Tomcat APR/native Connector</a>
 </li>
 </ul>
@@ -238,6 +241,46 @@
 
   
 </div>
+<h3 id="Fixed_in_Apache_Tomcat_Native_Connector_1.2.16">Fixed in Apache Tomcat 
Native Connector 1.2.16</h3>
+<div class="text">
+
+    
+<p>
+<i>Note: The issue below was fixed in Apache Tomcat Native Connector
+       1.2.15 but the release vote for the 1.2.15 release candidate did not
+       pass. Therefore, although users must download 1.2.16 to obtain a version
+       that includes the fix for this issue, version 1.2.15 is not included in
+       the list of affected versions.</i>
+</p>
+
+    
+<p>
+<strong>Moderate: OCSP check omitted</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15698"; 
rel="nofollow">CVE-2017-15698</a>
+</p>
+
+    
+<p>When parsing the AIA-Extension field of a client certificate, the Apache
+       Tomcat Native Connector did not correctly handle fields longer than 127
+       bytes. The result of the parsing error was to skip the OCSP check. It 
was
+       therefore possible for client certificates that should have been 
rejected
+       (if the OCSP check had been made) to be accepted. Users not using OCSP
+       checks are not affected by this vulnerability.
+    </p>
+
+    
+<p>This was fixed in revisions <a 
href="http://svn.apache.org/viewvc?view=rev&amp;rev=1815200";>1815200</a> and
+       <a 
href="http://svn.apache.org/viewvc?view=rev&amp;rev=1815218";>1815218</a>.</p>
+
+    
+<p>This issue was reported to the Apache Tomcat Security Team by Jonas
+       Klempel on 6 November 2017 and made public on 31 January 2018.</p>
+
+    
+<p>Affects: 1.2.0 to 1.2.14 and 1.1.23 to 1.1.34</p>
+
+  
+</div>
 <h3 id="Not_a_vulnerability_in_the_Apache_Tomcat_APR/native_Connector">Not a 
vulnerability in the Apache Tomcat APR/native Connector</h3>
 <div class="text">
     

Modified: tomcat/site/trunk/xdocs/security-7.xml
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-7.xml?rev=1822784&r1=1822783&r2=1822784&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/security-7.xml (original)
+++ tomcat/site/trunk/xdocs/security-7.xml Wed Jan 31 10:21:58 2018
@@ -50,6 +50,35 @@
 
   </section>
 
+  <section name="Fixed in Apache Tomcat 7.0.84" rtext="24 January 2018">
+
+    <p><strong>Low: Incorrectly documented CGI search algorithm</strong>
+       <cve>CVE-2017-15706</cve></p>
+
+    <p><i>Note: The issue below was fixed in Apache Tomcat 7.0.83 but the
+       release vote for the 7.0.83 release candidate did not pass. Therefore,
+       although users must download 7.0.84 to obtain a version that includes
+       the fix for this issue, version 7.0.83 is not included in the list of
+       affected versions.</i></p>
+
+    <p>As part of the fix for bug <bug>61201</bug>, the description of the
+       search algorithm used by the CGI Servlet to identify which script to
+       execute was updated. The update was not correct. As a result, some
+       scripts may have failed to execute as expected and other scripts may 
have
+       been executed unexpectedly. Note that the behaviour of the CGI servlet
+       has remained unchanged in this regard. It is only the documentation of
+       the behaviour that was wrong and has been corrected.</p>
+
+    <p>This was fixed in revision <revlink rev="1814828">1814828</revlink>.</p>
+
+    <p>This issue was reported to the Apache Tomcat Security Team by Michael
+       Grenier on 17 September 2017 and made public on 31 January 2018.</p>
+
+    <p>Affects: 7.0.79 to 7.0.82</p>
+
+  </section>
+
+
   <section name="Fixed in Apache Tomcat 7.0.82" rtext="4 October 2017">
 
     <p><strong>Important: Remote Code Execution</strong>

Modified: tomcat/site/trunk/xdocs/security-8.xml
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-8.xml?rev=1822784&r1=1822783&r2=1822784&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/security-8.xml (original)
+++ tomcat/site/trunk/xdocs/security-8.xml Wed Jan 31 10:21:58 2018
@@ -50,6 +50,50 @@
 
   </section>
 
+  <section name="Fixed in Apache Tomcat 8.0.48" rtext="12 December 2017">
+
+    <p><strong>Low: Incorrectly documented CGI search algorithm</strong>
+       <cve>CVE-2017-15706</cve></p>
+
+    <p>As part of the fix for bug <bug>61201</bug>, the description of the
+       search algorithm used by the CGI Servlet to identify which script to
+       execute was updated. The update was not correct. As a result, some
+       scripts may have failed to execute as expected and other scripts may 
have
+       been executed unexpectedly. Note that the behaviour of the CGI servlet
+       has remained unchanged in this regard. It is only the documentation of
+       the behaviour that was wrong and has been corrected.</p>
+
+    <p>This was fixed in revision <revlink rev="1814827">1814827</revlink>.</p>
+
+    <p>This issue was reported to the Apache Tomcat Security Team by Michael
+       Grenier on 17 September 2017 and made public on 31 January 2018.</p>
+
+    <p>Affects: 8.0.45 to 8.0.47</p>
+
+  </section>
+
+  <section name="Fixed in Apache Tomcat 8.5.24" rtext="30 November 2017">
+
+    <p><strong>Low: Incorrectly documented CGI search algorithm</strong>
+       <cve>CVE-2017-15706</cve></p>
+
+    <p>As part of the fix for bug <bug>61201</bug>, the description of the
+       search algorithm used by the CGI Servlet to identify which script to
+       execute was updated. The update was not correct. As a result, some
+       scripts may have failed to execute as expected and other scripts may 
have
+       been executed unexpectedly. Note that the behaviour of the CGI servlet
+       has remained unchanged in this regard. It is only the documentation of
+       the behaviour that was wrong and has been corrected.</p>
+
+    <p>This was fixed in revision <revlink rev="1814826">1814826</revlink>.</p>
+
+    <p>This issue was reported to the Apache Tomcat Security Team by Michael
+       Grenier on 17 September 2017 and made public on 31 January 2018.</p>
+
+    <p>Affects: 8.5.16 to 8.5.23</p>
+
+  </section>
+
   <section name="Fixed in Apache Tomcat 8.0.47" rtext="4 October 2017">
 
     <p><strong>Important: Remote Code Execution</strong>

Modified: tomcat/site/trunk/xdocs/security-9.xml
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-9.xml?rev=1822784&r1=1822783&r2=1822784&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/security-9.xml (original)
+++ tomcat/site/trunk/xdocs/security-9.xml Wed Jan 31 10:21:58 2018
@@ -50,6 +50,28 @@
 
   </section>
 
+  <section name="Fixed in Apache Tomcat 9.0.2" rtext="30 November 2017">
+
+    <p><strong>Low: Incorrectly documented CGI search algorithm</strong>
+       <cve>CVE-2017-15706</cve></p>
+
+    <p>As part of the fix for bug <bug>61201</bug>, the description of the
+       search algorithm used by the CGI Servlet to identify which script to
+       execute was updated. The update was not correct. As a result, some
+       scripts may have failed to execute as expected and other scripts may 
have
+       been executed unexpectedly. Note that the behaviour of the CGI servlet
+       has remained unchanged in this regard. It is only the documentation of
+       the behaviour that was wrong and has been corrected.</p>
+
+    <p>This was fixed in revision <revlink rev="1814825">1814825</revlink>.</p>
+
+    <p>This issue was reported to the Apache Tomcat Security Team by Michael
+       Grenier on 17 September 2017 and made public on 31 January 2018.</p>
+
+    <p>Affects: 9.0.0.M22 to 9.0.1</p>
+
+  </section>
+
   <section name="Fixed in Apache Tomcat 9.0.1" rtext="30 September 2017">
 
     <p><strong>Important: Remote Code Execution</strong>

Modified: tomcat/site/trunk/xdocs/security-native.xml
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-native.xml?rev=1822784&r1=1822783&r2=1822784&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/security-native.xml (original)
+++ tomcat/site/trunk/xdocs/security-native.xml Wed Jan 31 10:21:58 2018
@@ -32,6 +32,35 @@
 
   </section>
 
+  <section name="Fixed in Apache Tomcat Native Connector 1.2.16">
+
+    <p><i>Note: The issue below was fixed in Apache Tomcat Native Connector
+       1.2.15 but the release vote for the 1.2.15 release candidate did not
+       pass. Therefore, although users must download 1.2.16 to obtain a version
+       that includes the fix for this issue, version 1.2.15 is not included in
+       the list of affected versions.</i></p>
+
+    <p><strong>Moderate: OCSP check omitted</strong>
+       <cve>CVE-2017-15698</cve></p>
+
+    <p>When parsing the AIA-Extension field of a client certificate, the Apache
+       Tomcat Native Connector did not correctly handle fields longer than 127
+       bytes. The result of the parsing error was to skip the OCSP check. It 
was
+       therefore possible for client certificates that should have been 
rejected
+       (if the OCSP check had been made) to be accepted. Users not using OCSP
+       checks are not affected by this vulnerability.
+    </p>
+
+    <p>This was fixed in revisions <revlink rev="1815200">1815200</revlink> and
+       <revlink rev="1815218">1815218</revlink>.</p>
+
+    <p>This issue was reported to the Apache Tomcat Security Team by Jonas
+       Klempel on 6 November 2017 and made public on 31 January 2018.</p>
+
+    <p>Affects: 1.2.0 to 1.2.14 and 1.1.23 to 1.1.34</p>
+
+  </section>
+
   <section name="Not a vulnerability in the Apache Tomcat APR/native 
Connector">
     <p><strong>TLS SSL Man In The Middle</strong>
        <cve>CVE-2009-3555</cve></p>



---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org

Reply via email to