Thank you Mark. I know it's not a Tomcat vulnerability, but if the Hardening 
mitigates the other, then that had me wondering was all.

Thanks for the position clarification.

Dream * Excel * Explore * Inspire
Jon McAlexander
Infrastructure Engineer
Asst Vice President
He/His

Middleware Product Engineering
Enterprise CIO | EAS | Middleware | Infrastructure Solutions

8080 Cobblestone Rd | Urbandale, IA 50322
MAC: F4469-010
Tel 515-988-2508 | Cell 515-988-2508

jonmcalexan...@wellsfargo.com
This message may contain confidential and/or privileged information. If you are 
not the addressee or authorized to receive this for the addressee, you must not 
use, copy, disclose, or take any action based on this message or any 
information herein. If you have received this message in error, please advise 
the sender immediately by reply e-mail and delete this message. Thank you for 
your cooperation.


> -----Original Message-----
> From: Mark Thomas <ma...@apache.org>
> Sent: Thursday, March 31, 2022 10:08 AM
> To: dev@tomcat.apache.org
> Subject: Re: [VOTE] Release Apache Tomcat 10.1.0-M14
> 
> On 31/03/2022 15:56, jonmcalexan...@wellsfargo.com.INVALID wrote:
> > Noting the Hardening of the class loader, is this going to require this to 
> > be a
> security release of the newest Tomcat releases (forthcoming), or will they
> still just be standard releases?
> 
> That change does not address a security vulnerability in Apache Tomcat.
> 
> There will be no CVE for this change.
> 
> We generally use hardening to refer to things that do not address a
> vulnerability but improve the overall security posture. Typically, these
> changes provide additional defense in depth.
> 
> In this instance, it mitigates CVE-2022-22965 which is a Spring Framework
> vulnerability. The main purpose of the release is to provide end users with an
> alternative option if updating Tomcat is simpler than updating the version of
> Spring they are using.
> 
> To provide some context, similar recent hardening changes include:
> 
> - Using a constant time algorithm to compare passwords. Analysis showed
>    that a timing attack wasn't feasible but we switched now in case it
>    became feasible as some point in the future
> 
> - We changed the BeanFactory in 10.1.x (and might back-port the change)
>    to prevent it from being used if an application has a JNDI injection
>    vulnerability
> 
> Finally, we will either keep completely silent about security vulnerabilities
> until they are published or we will be completely open about them up front
> (e.g. if there is a zero day).
> 
> HTH,
> 
> Mark
> 
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org For additional
> commands, e-mail: dev-h...@tomcat.apache.org


---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org

Reply via email to