Author: markt
Date: Fri Dec 20 15:16:00 2024
New Revision: 1922612

URL: http://svn.apache.org/viewvc?rev=1922612&view=rev
Log:
Publish CVE-2024-56337

Modified:
    tomcat/site/trunk/docs/security-10.html
    tomcat/site/trunk/docs/security-11.html
    tomcat/site/trunk/docs/security-9.html
    tomcat/site/trunk/xdocs/security-10.xml
    tomcat/site/trunk/xdocs/security-11.xml
    tomcat/site/trunk/xdocs/security-9.xml

Modified: tomcat/site/trunk/docs/security-10.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-10.html?rev=1922612&r1=1922611&r2=1922612&view=diff
==============================================================================
--- tomcat/site/trunk/docs/security-10.html (original)
+++ tomcat/site/trunk/docs/security-10.html Fri Dec 20 15:16:00 2024
@@ -45,8 +45,30 @@
     <ul><li><a href="#Fixed_in_Apache_Tomcat_10.1.34">Fixed in Apache Tomcat 
10.1.34</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.33">Fixed in Apache 
Tomcat 10.1.33</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.31">Fixed in 
Apache Tomcat 10.1.31</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.25">Fixed in Apache Tomcat 
10.1.25</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.19">Fixed in Apache 
Tomcat 10.1.19</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.16">Fixed in 
Apache Tomcat 10.1.16</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.14">Fixed in Apache Tomcat 
10.1.14</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.13">Fixed in Apache 
Tomcat 10.1.13</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.9">Fixed in 
Apache Tomcat 10.1.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.8">Fixed 
in Apache Tomcat 10.1.8</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.6">Fixed in Apache Tomcat 
10.1.6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.5">Fixed in Apache
  Tomcat 10.1.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.2">Fixed in 
Apache Tomcat 10.1.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.1">Fixed 
in Apache Tomcat 10.1.1</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.27">Fixed in Apache Tomcat 
10.0.27</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.23">Fixed in Apache 
Tomcat 10.0.23</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M17">Fixed 
in Apache Tomcat 10.1.0-M17</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.21">Fixed in Apache Tomcat 
10.0.21</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M15">Fixed in 
Apache Tomcat 10.1.0-M15</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.20">Fixed in Apache Tomcat 
10.0.20</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M14">Fixed in 
Apache Tomcat 10.1.0-M14</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.16">Fixed in Apache Tomcat 
10.0.16</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M10">Fixed in 
Apache Tomcat 10.1.0-M10</a></li><li><a href="#Fixed
 _in_Apache_Tomcat_10.0.12">Fixed in Apache Tomcat 10.0.12</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.0-M6">Fixed in Apache Tomcat 
10.1.0-M6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.7">Fixed in Apache 
Tomcat 10.0.7</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.6">Fixed in 
Apache Tomcat 10.0.6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.5">Fixed 
in Apache Tomcat 10.0.5</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.4">Fixed in Apache Tomcat 
10.0.4</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.2">Fixed in Apache 
Tomcat 10.0.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M10">Fixed in 
Apache Tomcat 10.0.0-M10</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.0-M8">Fixed in Apache Tomcat 
10.0.0-M8</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M7">Fixed in 
Apache Tomcat 10.0.0-M7</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.0-M6">Fixed in Apache Tomcat 
10.0.0-M6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M5">Fixed in 
Apache Tomca
 t 10.0.0-M5</a></li><li><a href="#Not_a_vulnerability_in_Tomcat">Not a 
vulnerability in Tomcat</a></li></ul>
   </div><h3 id="Fixed_in_Apache_Tomcat_10.1.34"><span 
class="pull-right">2024-12-09</span> Fixed in Apache Tomcat 10.1.34</h3><div 
class="text">
   
-    <p><strong>Low: DoS in examples web application</strong>
+    <p><strong>Important: Remote Code Execution via write enabled Default
+       Servlet. Mitigation for CVE-2024-50379 was incomplete - </strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56337"; 
rel="nofollow">CVE-2024-56337</a></p>
+
+    <p>The previous mitigation for <a 
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50379"; 
rel="nofollow">CVE-2024-50379</a> was incomplete. In
+       addition to upgrading to 10.1.34 or later, users running Tomcat on a 
case
+       insensitive file system with the default servlet write enabled may need
+       additional configuration depending on the version of Java being used:
+       <ul>
+       <li>running on Java 11: the system property
+           <code>sun.io.useCanonCaches</code> must be explicitly set to
+           <code>false</code> (it defaults to <code>true</code>)</li>
+       <li>running on Java 17: the&nbsp;system property
+           <code>sun.io.useCanonCaches</code>, if set, must be set to
+           <code>false</code>&nbsp;(it defaults to <code>false</code>)</li>
+       <li>running on Java 21 onwards: no further configuration is 
required&nbsp;(the
+           system property and the problematic cache have been removed)</li>
+       </ul></p>
 
+    <p>The issue was made public on 20 December 2024.</p>
+
+    <p>Affects: 10.1.0-M1 to 10.1.33</p>
+    
+    <p><strong>Low: DoS in examples web application</strong>
        <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54677"; 
rel="nofollow">CVE-2024-54677</a></p>
 
     <p>Numerous examples in the examples web application did not place limits 
on

Modified: tomcat/site/trunk/docs/security-11.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-11.html?rev=1922612&r1=1922611&r2=1922612&view=diff
==============================================================================
--- tomcat/site/trunk/docs/security-11.html (original)
+++ tomcat/site/trunk/docs/security-11.html Fri Dec 20 15:16:00 2024
@@ -39,8 +39,27 @@
     <ul><li><a href="#Fixed_in_Apache_Tomcat_11.0.2">Fixed in Apache Tomcat 
11.0.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.1">Fixed in Apache 
Tomcat 11.0.1</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0">Fixed in 
Apache Tomcat 11.0.0</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.0-M21">Fixed in Apache Tomcat 
11.0.0-M21</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M17">Fixed in 
Apache Tomcat 11.0.0-M17</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.0-M12">Fixed in Apache Tomcat 
11.0.0-M12</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M11">Fixed in 
Apache Tomcat 11.0.0-M11</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.0-M6">Fixed in Apache Tomcat 
11.0.0-M6</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M5">Fixed in 
Apache Tomcat 11.0.0-M5</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.0-M3">Fixed in Apache Tomcat 
11.0.0-M3</a></li></ul>
   </div><h3 id="Fixed_in_Apache_Tomcat_11.0.2"><span 
class="pull-right">2024-12-09</span> Fixed in Apache Tomcat 11.0.2</h3><div 
class="text">
   
-    <p><strong>Low: DoS in examples web application</strong>
+    <p><strong>Important: Remote Code Execution via write enabled Default
+       Servlet. Mitigation for CVE-2024-50379 was incomplete - </strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56337"; 
rel="nofollow">CVE-2024-56337</a></p>
+
+    <p>The previous mitigation for <a 
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50379"; 
rel="nofollow">CVE-2024-50379</a> was incomplete. In
+       addition to upgrading to 11.0.2 or later, users running Tomcat on a case
+       insensitive file system with the default servlet write enabled may need
+       additional configuration depending on the version of Java being used:
+       <ul>
+       <li>running on Java 17: the&nbsp;system property
+           <code>sun.io.useCanonCaches</code>, if set, must be set to
+           <code>false</code>&nbsp;(it defaults to <code>false</code>)</li>
+       <li>running on Java 21 onwards: no further configuration is 
required&nbsp;(the
+           system property and the problematic cache have been removed)</li>
+       </ul></p>
 
+    <p>The issue was made public on 20 December 2024.</p>
+
+    <p>Affects: 11.0.0-M1 to 11.0.1</p>
+    
+    <p><strong>Low: DoS in examples web application</strong>
        <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54677"; 
rel="nofollow">CVE-2024-54677</a></p>
 
     <p>Numerous examples in the examples web application did not place limits 
on

Modified: tomcat/site/trunk/docs/security-9.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-9.html?rev=1922612&r1=1922611&r2=1922612&view=diff
==============================================================================
--- tomcat/site/trunk/docs/security-9.html (original)
+++ tomcat/site/trunk/docs/security-9.html Fri Dec 20 15:16:00 2024
@@ -39,8 +39,30 @@
     <ul><li><a href="#Fixed_in_Apache_Tomcat_9.0.98">Fixed in Apache Tomcat 
9.0.98</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.97">Fixed in Apache 
Tomcat 9.0.97</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.96">Fixed in 
Apache Tomcat 9.0.96</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.90">Fixed 
in Apache Tomcat 9.0.90</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.86">Fixed in Apache Tomcat 
9.0.86</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.83">Fixed in Apache 
Tomcat 9.0.83</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.81">Fixed in 
Apache Tomcat 9.0.81</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.80">Fixed 
in Apache Tomcat 9.0.80</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.75">Fixed in Apache Tomcat 
9.0.75</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.74">Fixed in Apache 
Tomcat 9.0.74</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.72">Fixed in 
Apache Tomcat 9.0.72</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.71">Fixed 
in Apache Tomcat 9.0.71</
 a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.69">Fixed in Apache Tomcat 
9.0.69</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.68">Fixed in Apache 
Tomcat 9.0.68</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.65">Fixed in 
Apache Tomcat 9.0.65</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.63">Fixed 
in Apache Tomcat 9.0.63</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.62">Fixed in Apache Tomcat 
9.0.62</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.58">Fixed in Apache 
Tomcat 9.0.58</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.54">Fixed in 
Apache Tomcat 9.0.54</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.48">Fixed 
in Apache Tomcat 9.0.48</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.46">Fixed in Apache Tomcat 
9.0.46</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.45">Fixed in Apache 
Tomcat 9.0.45</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.44">Fixed in 
Apache Tomcat 9.0.44</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.43">Fixed 
in Apache Tomcat 9.0.43</a
 ></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.40">Fixed in Apache Tomcat 
 >9.0.40</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.38">Fixed in Apache 
 >Tomcat 9.0.38</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.37">Fixed in 
 >Apache Tomcat 9.0.37</a></li><li><a 
 >href="#Fixed_in_Apache_Tomcat_9.0.36">Fixed in Apache Tomcat 
 >9.0.36</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.35">Fixed in Apache 
 >Tomcat 9.0.35</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.31">Fixed in 
 >Apache Tomcat 9.0.31</a></li><li><a 
 >href="#Fixed_in_Apache_Tomcat_9.0.30">Fixed in Apache Tomcat 
 >9.0.30</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.29">Fixed in Apache 
 >Tomcat 9.0.29</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.21">Fixed in 
 >Apache Tomcat 9.0.21</a></li><li><a 
 >href="#Fixed_in_Apache_Tomcat_9.0.20">Fixed in Apache Tomcat 
 >9.0.20</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.19">Fixed in Apache 
 >Tomcat 9.0.19</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.16">Fixed in 
 >Apache Tomcat 9.0.16</a>
 </li><li><a href="#Fixed_in_Apache_Tomcat_9.0.12">Fixed in Apache Tomcat 
9.0.12</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.10">Fixed in Apache 
Tomcat 9.0.10</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.9">Fixed in 
Apache Tomcat 9.0.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.8">Fixed 
in Apache Tomcat 9.0.8</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.5">Fixed in Apache Tomcat 
9.0.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.2">Fixed in Apache 
Tomcat 9.0.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.1">Fixed in 
Apache Tomcat 9.0.1</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.0.M22">Fixed in Apache Tomcat 
9.0.0.M22</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M21">Fixed in 
Apache Tomcat 9.0.0.M21</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.0.M19">Fixed in Apache Tomcat 
9.0.0.M19</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M18">Fixed in 
Apache Tomcat 9.0.0.M18</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.0.M17">Fixed in Apache T
 omcat 9.0.0.M17</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M15">Fixed 
in Apache Tomcat 9.0.0.M15</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.0.M13">Fixed in Apache Tomcat 
9.0.0.M13</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M10">Fixed in 
Apache Tomcat 9.0.0.M10</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.0.M8">Fixed in Apache Tomcat 
9.0.0.M8</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M3">Fixed in Apache 
Tomcat 9.0.0.M3</a></li><li><a href="#Not_a_vulnerability_in_Tomcat">Not a 
vulnerability in Tomcat</a></li></ul>
   </div><h3 id="Fixed_in_Apache_Tomcat_9.0.98"><span 
class="pull-right">2024-12-09</span> Fixed in Apache Tomcat 9.0.98</h3><div 
class="text">
   
-    <p><strong>Low: DoS in examples web application</strong>
+    <p><strong>Important: Remote Code Execution via write enabled Default
+       Servlet. Mitigation for CVE-2024-50379 was incomplete - </strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56337"; 
rel="nofollow">CVE-2024-56337</a></p>
+
+    <p>The previous mitigation for <a 
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50379"; 
rel="nofollow">CVE-2024-50379</a> was incomplete. In
+       addition to upgrading to 9.0.98 or later, users running Tomcat on a case
+       insensitive file system with the default servlet write enabled may need
+       additional configuration depending on the version of Java being used:
+       <ul>
+       <li>running on Java 8 or Java 11: the system property
+           <code>sun.io.useCanonCaches</code> must be explicitly set to
+           <code>false</code> (it defaults to <code>true</code>)</li>
+       <li>running on Java 17: the&nbsp;system property
+           <code>sun.io.useCanonCaches</code>, if set, must be set to
+           <code>false</code>&nbsp;(it defaults to <code>false</code>)</li>
+       <li>running on Java 21 onwards: no further configuration is 
required&nbsp;(the
+           system property and the problematic cache have been removed)</li>
+       </ul></p>
 
+    <p>The issue was made public on 20 December 2024.</p>
+
+    <p>Affects: 9.0.0.M1 to 9.0.97</p>
+    
+    <p><strong>Low: DoS in examples web application</strong>
        <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54677"; 
rel="nofollow">CVE-2024-54677</a></p>
 
     <p>Numerous examples in the examples web application did not place limits 
on

Modified: tomcat/site/trunk/xdocs/security-10.xml
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-10.xml?rev=1922612&r1=1922611&r2=1922612&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/security-10.xml (original)
+++ tomcat/site/trunk/xdocs/security-10.xml Fri Dec 20 15:16:00 2024
@@ -58,8 +58,30 @@
 
   <section name="Fixed in Apache Tomcat 10.1.34" rtext="2024-12-09">
   
-    <p><strong>Low: DoS in examples web application</strong>
+    <p><strong>Important: Remote Code Execution via write enabled Default
+       Servlet. Mitigation for CVE-2024-50379 was incomplete - </strong>
+       <cve>CVE-2024-56337</cve></p>
+
+    <p>The previous mitigation for <cve>CVE-2024-50379</cve> was incomplete. In
+       addition to upgrading to 10.1.34 or later, users running Tomcat on a 
case
+       insensitive file system with the default servlet write enabled may need
+       additional configuration depending on the version of Java being used:
+       <ul>
+       <li>running on Java 11: the system property
+           <code>sun.io.useCanonCaches</code> must be explicitly set to
+           <code>false</code> (it defaults to <code>true</code>)</li>
+       <li>running on Java 17: the system property
+           <code>sun.io.useCanonCaches</code>, if set, must be set to
+           <code>false</code> (it defaults to <code>false</code>)</li>
+       <li>running on Java 21 onwards: no further configuration is required 
(the
+           system property and the problematic cache have been removed)</li>
+       </ul></p>
 
+    <p>The issue was made public on 20 December 2024.</p>
+
+    <p>Affects: 10.1.0-M1 to 10.1.33</p>
+    
+    <p><strong>Low: DoS in examples web application</strong>
        <cve>CVE-2024-54677</cve></p>
 
     <p>Numerous examples in the examples web application did not place limits 
on

Modified: tomcat/site/trunk/xdocs/security-11.xml
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-11.xml?rev=1922612&r1=1922611&r2=1922612&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/security-11.xml (original)
+++ tomcat/site/trunk/xdocs/security-11.xml Fri Dec 20 15:16:00 2024
@@ -52,8 +52,27 @@
 
   <section name="Fixed in Apache Tomcat 11.0.2" rtext="2024-12-09">
   
-    <p><strong>Low: DoS in examples web application</strong>
+    <p><strong>Important: Remote Code Execution via write enabled Default
+       Servlet. Mitigation for CVE-2024-50379 was incomplete - </strong>
+       <cve>CVE-2024-56337</cve></p>
+
+    <p>The previous mitigation for <cve>CVE-2024-50379</cve> was incomplete. In
+       addition to upgrading to 11.0.2 or later, users running Tomcat on a case
+       insensitive file system with the default servlet write enabled may need
+       additional configuration depending on the version of Java being used:
+       <ul>
+       <li>running on Java 17: the system property
+           <code>sun.io.useCanonCaches</code>, if set, must be set to
+           <code>false</code> (it defaults to <code>false</code>)</li>
+       <li>running on Java 21 onwards: no further configuration is required 
(the
+           system property and the problematic cache have been removed)</li>
+       </ul></p>
 
+    <p>The issue was made public on 20 December 2024.</p>
+
+    <p>Affects: 11.0.0-M1 to 11.0.1</p>
+    
+    <p><strong>Low: DoS in examples web application</strong>
        <cve>CVE-2024-54677</cve></p>
 
     <p>Numerous examples in the examples web application did not place limits 
on

Modified: tomcat/site/trunk/xdocs/security-9.xml
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-9.xml?rev=1922612&r1=1922611&r2=1922612&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/security-9.xml (original)
+++ tomcat/site/trunk/xdocs/security-9.xml Fri Dec 20 15:16:00 2024
@@ -52,8 +52,30 @@
 
   <section name="Fixed in Apache Tomcat 9.0.98" rtext="2024-12-09">
   
-    <p><strong>Low: DoS in examples web application</strong>
+    <p><strong>Important: Remote Code Execution via write enabled Default
+       Servlet. Mitigation for CVE-2024-50379 was incomplete - </strong>
+       <cve>CVE-2024-56337</cve></p>
+
+    <p>The previous mitigation for <cve>CVE-2024-50379</cve> was incomplete. In
+       addition to upgrading to 9.0.98 or later, users running Tomcat on a case
+       insensitive file system with the default servlet write enabled may need
+       additional configuration depending on the version of Java being used:
+       <ul>
+       <li>running on Java 8 or Java 11: the system property
+           <code>sun.io.useCanonCaches</code> must be explicitly set to
+           <code>false</code> (it defaults to <code>true</code>)</li>
+       <li>running on Java 17: the system property
+           <code>sun.io.useCanonCaches</code>, if set, must be set to
+           <code>false</code> (it defaults to <code>false</code>)</li>
+       <li>running on Java 21 onwards: no further configuration is required 
(the
+           system property and the problematic cache have been removed)</li>
+       </ul></p>
 
+    <p>The issue was made public on 20 December 2024.</p>
+
+    <p>Affects: 9.0.0.M1 to 9.0.97</p>
+    
+    <p><strong>Low: DoS in examples web application</strong>
        <cve>CVE-2024-54677</cve></p>
 
     <p>Numerous examples in the examples web application did not place limits 
on



---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org

Reply via email to