Author: markt
Date: Thu Jun 20 19:20:22 2019
New Revision: 1861711

URL: http://svn.apache.org/viewvc?rev=1861711&view=rev
Log:
Add CVE-2019-10072

Modified:
    tomcat/site/trunk/docs/security-8.html
    tomcat/site/trunk/docs/security-9.html
    tomcat/site/trunk/xdocs/security-8.xml
    tomcat/site/trunk/xdocs/security-9.xml

Modified: tomcat/site/trunk/docs/security-8.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-8.html?rev=1861711&r1=1861710&r2=1861711&view=diff
==============================================================================
--- tomcat/site/trunk/docs/security-8.html (original)
+++ tomcat/site/trunk/docs/security-8.html Thu Jun 20 19:20:22 2019
@@ -216,6 +216,9 @@
 <a href="#Apache_Tomcat_8.x_vulnerabilities">Apache Tomcat 8.x 
vulnerabilities</a>
 </li>
 <li>
+<a href="#Fixed_in_Apache_Tomcat_8.5.41">Fixed in Apache Tomcat 8.5.41</a>
+</li>
+<li>
 <a href="#Fixed_in_Apache_Tomcat_8.5.40">Fixed in Apache Tomcat 8.5.40</a>
 </li>
 <li>
@@ -381,6 +384,39 @@
 
   
 </div>
+<h3 id="Fixed_in_Apache_Tomcat_8.5.41">
+<span class="pull-right">13 May 2019</span> Fixed in Apache Tomcat 8.5.41</h3>
+<div class="text">
+
+    
+<p>
+<strong>Important: Denial of Service</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10072"; 
rel="nofollow">CVE-2019-10072</a>
+</p>
+
+    
+<p>The fix for <a 
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0199"; 
rel="nofollow">CVE-2019-0199</a> was incomplete and did not address
+       HTTP/2 connection window exhaustion on write. By not sending
+       WINDOW_UPDATE messages for the connection window (stream 0) clients were
+       able to cause server-side threads to block eventually leading to thread
+       exhaustion and a DoS.</p>
+
+    
+<p>This was fixed with commits
+       <a href="https://github.com/apache/tomcat/commit/0bcd69c";>0bcd69c</a> 
and
+       <a 
href="https://github.com/apache/tomcat/commit/8d14c6f";>8d14c6f</a>.</p>
+
+    
+<p>This issue was reported to the Apache Tomcat Security Team by John
+       Simpson of Trend Micro Security Research working with Trend Micro's Zero
+       Day Initiative on 26 April 2019. The issue was made public on 20 June
+       2019.</p>
+
+    
+<p>Affects: 8.5.0 to 8.5.40</p>
+
+  
+</div>
 <h3 id="Fixed_in_Apache_Tomcat_8.5.40">
 <span class="pull-right">12 April 2019</span> Fixed in Apache Tomcat 
8.5.40</h3>
 <div class="text">

Modified: tomcat/site/trunk/docs/security-9.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-9.html?rev=1861711&r1=1861710&r2=1861711&view=diff
==============================================================================
--- tomcat/site/trunk/docs/security-9.html (original)
+++ tomcat/site/trunk/docs/security-9.html Thu Jun 20 19:20:22 2019
@@ -216,6 +216,9 @@
 <a href="#Apache_Tomcat_9.x_vulnerabilities">Apache Tomcat 9.x 
vulnerabilities</a>
 </li>
 <li>
+<a href="#Fixed_in_Apache_Tomcat_9.0.20">Fixed in Apache Tomcat 9.0.20</a>
+</li>
+<li>
 <a href="#Fixed_in_Apache_Tomcat_9.0.19">Fixed in Apache Tomcat 9.0.19</a>
 </li>
 <li>
@@ -321,6 +324,39 @@
 
   
 </div>
+<h3 id="Fixed_in_Apache_Tomcat_9.0.20">
+<span class="pull-right">13 May 2019</span> Fixed in Apache Tomcat 9.0.20</h3>
+<div class="text">
+
+    
+<p>
+<strong>Important: Denial of Service</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10072"; 
rel="nofollow">CVE-2019-10072</a>
+</p>
+
+    
+<p>The fix for <a 
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0199"; 
rel="nofollow">CVE-2019-0199</a> was incomplete and did not address
+       HTTP/2 connection window exhaustion on write. By not sending
+       WINDOW_UPDATE messages for the connection window (stream 0) clients were
+       able to cause server-side threads to block eventually leading to thread
+       exhaustion and a DoS.</p>
+
+    
+<p>This was fixed with commits
+       <a href="https://github.com/apache/tomcat/commit/7f748eb";>7f748eb</a> 
and
+       <a 
href="https://github.com/apache/tomcat/commit/ada725a";>ada725a</a>.</p>
+
+    
+<p>This issue was reported to the Apache Tomcat Security Team by John
+       Simpson of Trend Micro Security Research working with Trend Micro's Zero
+       Day Initiative on 26 April 2019. The issue was made public on 20 June
+       2019.</p>
+
+    
+<p>Affects: 9.0.0.M1 to 9.0.19</p>
+
+  
+</div>
 <h3 id="Fixed_in_Apache_Tomcat_9.0.19">
 <span class="pull-right">13 April 2019</span> Fixed in Apache Tomcat 
9.0.19</h3>
 <div class="text">

Modified: tomcat/site/trunk/xdocs/security-8.xml
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-8.xml?rev=1861711&r1=1861710&r2=1861711&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/security-8.xml (original)
+++ tomcat/site/trunk/xdocs/security-8.xml Thu Jun 20 19:20:22 2019
@@ -50,6 +50,30 @@
 
   </section>
 
+  <section name="Fixed in Apache Tomcat 8.5.41" rtext="13 May 2019">
+
+    <p><strong>Important: Denial of Service</strong>
+       <cve>CVE-2019-10072</cve></p>
+
+    <p>The fix for <cve>CVE-2019-0199</cve> was incomplete and did not address
+       HTTP/2 connection window exhaustion on write. By not sending
+       WINDOW_UPDATE messages for the connection window (stream 0) clients were
+       able to cause server-side threads to block eventually leading to thread
+       exhaustion and a DoS.</p>
+
+    <p>This was fixed with commits
+       <hashlink hash="0bcd69c">0bcd69c</hashlink> and
+       <hashlink hash="8d14c6f">8d14c6f</hashlink>.</p>
+
+    <p>This issue was reported to the Apache Tomcat Security Team by John
+       Simpson of Trend Micro Security Research working with Trend Micro's Zero
+       Day Initiative on 26 April 2019. The issue was made public on 20 June
+       2019.</p>
+
+    <p>Affects: 8.5.0 to 8.5.40</p>
+
+  </section>
+  
   <section name="Fixed in Apache Tomcat 8.5.40" rtext="12 April 2019">
 
     <p><strong>Important: Remote Code Execution on Windows</strong>

Modified: tomcat/site/trunk/xdocs/security-9.xml
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-9.xml?rev=1861711&r1=1861710&r2=1861711&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/security-9.xml (original)
+++ tomcat/site/trunk/xdocs/security-9.xml Thu Jun 20 19:20:22 2019
@@ -50,6 +50,30 @@
 
   </section>
 
+  <section name="Fixed in Apache Tomcat 9.0.20" rtext="13 May 2019">
+
+    <p><strong>Important: Denial of Service</strong>
+       <cve>CVE-2019-10072</cve></p>
+
+    <p>The fix for <cve>CVE-2019-0199</cve> was incomplete and did not address
+       HTTP/2 connection window exhaustion on write. By not sending
+       WINDOW_UPDATE messages for the connection window (stream 0) clients were
+       able to cause server-side threads to block eventually leading to thread
+       exhaustion and a DoS.</p>
+
+    <p>This was fixed with commits
+       <hashlink hash="7f748eb">7f748eb</hashlink> and
+       <hashlink hash="ada725a">ada725a</hashlink>.</p>
+
+    <p>This issue was reported to the Apache Tomcat Security Team by John
+       Simpson of Trend Micro Security Research working with Trend Micro's Zero
+       Day Initiative on 26 April 2019. The issue was made public on 20 June
+       2019.</p>
+
+    <p>Affects: 9.0.0.M1 to 9.0.19</p>
+
+  </section>
+  
   <section name="Fixed in Apache Tomcat 9.0.19" rtext="13 April 2019">
 
     <p><i>Note: The issues below were fixed in Apache Tomcat 9.0.18 but the



---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org

Reply via email to