Author: markt Date: Fri Aug 12 13:09:21 2011 New Revision: 1157086 URL: http://svn.apache.org/viewvc?rev=1157086&view=rev Log: Update site for CVE-2011-2729
Modified: tomcat/site/trunk/docs/security-5.html tomcat/site/trunk/docs/security-6.html tomcat/site/trunk/docs/security-7.html tomcat/site/trunk/xdocs/security-5.xml tomcat/site/trunk/xdocs/security-6.xml tomcat/site/trunk/xdocs/security-7.xml Modified: tomcat/site/trunk/docs/security-5.html URL: http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-5.html?rev=1157086&r1=1157085&r2=1157086&view=diff ============================================================================== --- tomcat/site/trunk/docs/security-5.html (original) +++ tomcat/site/trunk/docs/security-5.html Fri Aug 12 13:09:21 2011 @@ -390,6 +390,33 @@ <p>Affects: 5.5.0-5.5.33</p> + <p> +<strong>Important: Information disclosure</strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2729" rel="nofollow">CVE-2011-2729</a> +</p> + + <p>Due to a bug in the capabilities code, jsvc (the service wrapper for + Linux that is part of the Commons Daemon project) does not drop + capabilities allowing the application to access files and directories + owned by superuser. This vulnerability only occurs when all of the + following are true: + <ul> + <li>Tomcat is running on a Linux operating system</li> + <li>jsvc was compiled with libcap</li> + <li>-user parameter is used</li> + </ul> + Affected Tomcat versions shipped with source files for jsvc that included + this vulnerability. + </p> + + <p>There is a <a href="http://people.apache.org/~markt/patches/2011-08-12-cve-2011-22729-tc5.patch"> + proposed patch</a> for this issue.</p> + + <p>This was identified by Wilfried Weissmann on 20 July 2011 and made public + on 12 August 2011.</p> + + <p>Affects: 5.5.32-5.5.33</p> + </blockquote> </p> </td> Modified: tomcat/site/trunk/docs/security-6.html URL: http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-6.html?rev=1157086&r1=1157085&r2=1157086&view=diff ============================================================================== --- tomcat/site/trunk/docs/security-6.html (original) +++ tomcat/site/trunk/docs/security-6.html Fri Aug 12 13:09:21 2011 @@ -387,6 +387,34 @@ <p>Affects: 6.0.0-6.0.32</p> + <p> +<strong>Important: Information disclosure</strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2729" rel="nofollow">CVE-2011-2729</a> +</p> + + <p>Due to a bug in the capabilities code, jsvc (the service wrapper for + Linux that is part of the Commons Daemon project) does not drop + capabilities allowing the application to access files and directories + owned by superuser. This vulnerability only occurs when all of the + following are true: + <ul> + <li>Tomcat is running on a Linux operating system</li> + <li>jsvc was compiled with libcap</li> + <li>-user parameter is used</li> + </ul> + Affected Tomcat versions shipped with source files for jsvc that included + this vulnerability. + </p> + + <p>This was fixed in revision + <a href="http://svn.apache.org/viewvc?rev=1153824&view=rev"> + 1153824</a>.</p> + + <p>This was identified by Wilfried Weissmann on 20 July 2011 and made public + on 12 August 2011.</p> + + <p>Affects: 6.0.30-6.0.32</p> + </blockquote> </p> </td> Modified: tomcat/site/trunk/docs/security-7.html URL: http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-7.html?rev=1157086&r1=1157085&r2=1157086&view=diff ============================================================================== --- tomcat/site/trunk/docs/security-7.html (original) +++ tomcat/site/trunk/docs/security-7.html Fri Aug 12 13:09:21 2011 @@ -215,6 +215,9 @@ <a href="#Apache_Tomcat_7.x_vulnerabilities">Apache Tomcat 7.x vulnerabilities</a> </li> <li> +<a href="#Fixed_in_Apache_Tomcat_7.0.20">Fixed in Apache Tomcat 7.0.20</a> +</li> +<li> <a href="#Fixed_in_Apache_Tomcat_7.0.19">Fixed in Apache Tomcat 7.0.19</a> </li> <li> @@ -296,6 +299,62 @@ <tr> <td bgcolor="#525D76"> <font color="#ffffff" face="arial,helvetica,sanserif"> +<a name="Fixed in Apache Tomcat 7.0.20"> +<!--()--> +</a> +<a name="Fixed_in_Apache_Tomcat_7.0.20"> +<strong>Fixed in Apache Tomcat 7.0.20</strong> +</a> +</font> +</td> +</tr> +<tr> +<td> +<p> +<blockquote> + + <p> +<strong>Important: Information disclosure</strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2729" rel="nofollow">CVE-2011-2729</a> +</p> + + <p>Due to a bug in the capabilities code, jsvc (the service wrapper for + Linux that is part of the Commons Daemon project) does not drop + capabilities allowing the application to access files and directories + owned by superuser. This vulnerability only occurs when all of the + following are true: + <ul> + <li>Tomcat is running on a Linux operating system</li> + <li>jsvc was compiled with libcap</li> + <li>-user parameter is used</li> + </ul> + Affected Tomcat versions shipped with source files for jsvc that included + this vulnerability. + </p> + + <p>This was fixed in revision + <a href="http://svn.apache.org/viewvc?rev=1153379&view=rev"> + 1153379</a>.</p> + + <p>This was identified by Wilfried Weissmann on 20 July 2011 and made public + on 12 August 2011.</p> + + <p>Affects: 7.0.0-7.0.19</p> + + </blockquote> +</p> +</td> +</tr> +<tr> +<td> +<br/> +</td> +</tr> +</table> +<table border="0" cellspacing="0" cellpadding="2" width="100%"> +<tr> +<td bgcolor="#525D76"> +<font color="#ffffff" face="arial,helvetica,sanserif"> <a name="Fixed in Apache Tomcat 7.0.19"> <!--()--> </a> Modified: tomcat/site/trunk/xdocs/security-5.xml URL: http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-5.xml?rev=1157086&r1=1157085&r2=1157086&view=diff ============================================================================== --- tomcat/site/trunk/xdocs/security-5.xml (original) +++ tomcat/site/trunk/xdocs/security-5.xml Fri Aug 12 13:09:21 2011 @@ -83,6 +83,32 @@ <p>Affects: 5.5.0-5.5.33</p> + <p><strong>Important: Information disclosure</strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2729" + rel="nofollow">CVE-2011-2729</a></p> + + <p>Due to a bug in the capabilities code, jsvc (the service wrapper for + Linux that is part of the Commons Daemon project) does not drop + capabilities allowing the application to access files and directories + owned by superuser. This vulnerability only occurs when all of the + following are true: + <ul> + <li>Tomcat is running on a Linux operating system</li> + <li>jsvc was compiled with libcap</li> + <li>-user parameter is used</li> + </ul> + Affected Tomcat versions shipped with source files for jsvc that included + this vulnerability. + </p> + + <p>There is a <a href="http://people.apache.org/~markt/patches/2011-08-12-cve-2011-22729-tc5.patch"> + proposed patch</a> for this issue.</p> + + <p>This was identified by Wilfried Weissmann on 20 July 2011 and made public + on 12 August 2011.</p> + + <p>Affects: 5.5.32-5.5.33</p> + </section> <section name="Fixed in Apache Tomcat 5.5.34 (not yet released)"> Modified: tomcat/site/trunk/xdocs/security-6.xml URL: http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-6.xml?rev=1157086&r1=1157085&r2=1157086&view=diff ============================================================================== --- tomcat/site/trunk/xdocs/security-6.xml (original) +++ tomcat/site/trunk/xdocs/security-6.xml Fri Aug 12 13:09:21 2011 @@ -90,6 +90,33 @@ <p>Affects: 6.0.0-6.0.32</p> + <p><strong>Important: Information disclosure</strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2729" + rel="nofollow">CVE-2011-2729</a></p> + + <p>Due to a bug in the capabilities code, jsvc (the service wrapper for + Linux that is part of the Commons Daemon project) does not drop + capabilities allowing the application to access files and directories + owned by superuser. This vulnerability only occurs when all of the + following are true: + <ul> + <li>Tomcat is running on a Linux operating system</li> + <li>jsvc was compiled with libcap</li> + <li>-user parameter is used</li> + </ul> + Affected Tomcat versions shipped with source files for jsvc that included + this vulnerability. + </p> + + <p>This was fixed in revision + <a href="http://svn.apache.org/viewvc?rev=1153824&view=rev"> + 1153824</a>.</p> + + <p>This was identified by Wilfried Weissmann on 20 July 2011 and made public + on 12 August 2011.</p> + + <p>Affects: 6.0.30-6.0.32</p> + </section> <section name="Fixed in Apache Tomcat 6.0.32" rtext="released 03 Feb 2011"> Modified: tomcat/site/trunk/xdocs/security-7.xml URL: http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-7.xml?rev=1157086&r1=1157085&r2=1157086&view=diff ============================================================================== --- tomcat/site/trunk/xdocs/security-7.xml (original) +++ tomcat/site/trunk/xdocs/security-7.xml Fri Aug 12 13:09:21 2011 @@ -25,6 +25,37 @@ <a href="mailto:secur...@tomcat.apache.org">Tomcat Security Team</a>.</p> </section> + <section name="Fixed in Apache Tomcat 7.0.20"> + + <p><strong>Important: Information disclosure</strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2729" + rel="nofollow">CVE-2011-2729</a></p> + + <p>Due to a bug in the capabilities code, jsvc (the service wrapper for + Linux that is part of the Commons Daemon project) does not drop + capabilities allowing the application to access files and directories + owned by superuser. This vulnerability only occurs when all of the + following are true: + <ul> + <li>Tomcat is running on a Linux operating system</li> + <li>jsvc was compiled with libcap</li> + <li>-user parameter is used</li> + </ul> + Affected Tomcat versions shipped with source files for jsvc that included + this vulnerability. + </p> + + <p>This was fixed in revision + <a href="http://svn.apache.org/viewvc?rev=1153379&view=rev"> + 1153379</a>.</p> + + <p>This was identified by Wilfried Weissmann on 20 July 2011 and made public + on 12 August 2011.</p> + + <p>Affects: 7.0.0-7.0.19</p> + + </section> + <section name="Fixed in Apache Tomcat 7.0.19"> <p><strong>Low: Information disclosure</strong> --------------------------------------------------------------------- To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org For additional commands, e-mail: dev-h...@tomcat.apache.org