Author: markt
Date: Tue Aug 16 12:53:02 2011
New Revision: 1158247

URL: http://svn.apache.org/viewvc?rev=1158247&view=rev
Log:
Update now patch has been applied to 5.5.x

Modified:
    tomcat/site/trunk/docs/security-5.html
    tomcat/site/trunk/xdocs/security-5.xml

Modified: tomcat/site/trunk/docs/security-5.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-5.html?rev=1158247&r1=1158246&r2=1158247&view=diff
==============================================================================
--- tomcat/site/trunk/docs/security-5.html (original)
+++ tomcat/site/trunk/docs/security-5.html Tue Aug 16 12:53:02 2011
@@ -355,42 +355,6 @@
 <blockquote>
 
     <p>
-<strong>Low: Information disclosure</strong>
-       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2526"; 
rel="nofollow">CVE-2011-2526</a>
-</p>
-
-    <p>Tomcat provides support for sendfile with the HTTP NIO and HTTP APR
-       connectors. sendfile is used automatically for content served via the
-       DefaultServlet and deployed web applications may use it directly via
-       setting request attributes. These request attributes were not validated.
-       When running under a security manager, this lack of validation allowed a
-       malicious web application to do one or more of the following that would
-       normally be prevented by a security manager:
-       <ul>
-         <li>return files to users that the security manager should make
-             inaccessible</li>
-         <li>terminate (via a crash) the JVM</li>
-       </ul>
-       Additionally, these vulnerabilities only occur when all of the following
-       are true:
-       <ul>
-         <li>untrusted web applications are being used</li>
-         <li>the SecurityManager is used to limit the untrusted web 
applications
-             </li>
-         <li>the HTTP NIO or HTTP APR connector is used</li>
-         <li>sendfile is enabled for the connector (this is the default)</li>
-       </ul>
-    </p>
-
-    <p>There is a <a 
href="http://people.apache.org/~markt/patches/2011-07-13-cve-2011-2526-tc5.patch";>
-       proposed patch</a> for this issue.</p>
-
-    <p>This was identified by the Tomcat security team on 7 July 2011 and
-       made public on 13 July 2011.</p>
-
-    <p>Affects: 5.5.0-5.5.33</p>
-
-    <p>
 <strong>Important: Information disclosure</strong>
        <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2729"; 
rel="nofollow">CVE-2011-2729</a>
 </p>
@@ -468,6 +432,43 @@
 
     <p>Affects: 5.5.0-5.5.33</p>
   
+    <p>
+<strong>Low: Information disclosure</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2526"; 
rel="nofollow">CVE-2011-2526</a>
+</p>
+
+    <p>Tomcat provides support for sendfile with the HTTP APR
+       connector. sendfile is used automatically for content served via the
+       DefaultServlet and deployed web applications may use it directly via
+       setting request attributes. These request attributes were not validated.
+       When running under a security manager, this lack of validation allowed a
+       malicious web application to do one or more of the following that would
+       normally be prevented by a security manager:
+       <ul>
+         <li>return files to users that the security manager should make
+             inaccessible</li>
+         <li>terminate (via a crash) the JVM</li>
+       </ul>
+       Additionally, these vulnerabilities only occur when all of the following
+       are true:
+       <ul>
+         <li>untrusted web applications are being used</li>
+         <li>the SecurityManager is used to limit the untrusted web 
applications
+             </li>
+         <li>the HTTP APR connector is used</li>
+         <li>sendfile is enabled for the connector (this is the default)</li>
+       </ul>
+    </p>
+
+    <p>This was fixed in
+       <a href="http://svn.apache.org/viewvc?rev=1158244&amp;view=rev";>
+       revision 1158244</a>.</p>
+
+    <p>This was identified by the Tomcat security team on 7 July 2011 and
+       made public on 13 July 2011.</p>
+
+    <p>Affects: 5.5.0-5.5.33</p>
+
   </blockquote>
 </p>
 </td>

Modified: tomcat/site/trunk/xdocs/security-5.xml
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-5.xml?rev=1158247&r1=1158246&r2=1158247&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/security-5.xml (original)
+++ tomcat/site/trunk/xdocs/security-5.xml Tue Aug 16 12:53:02 2011
@@ -48,41 +48,6 @@
 
   <section name="To be fixed in Apache Tomcat 5.5.34 (not yet released)">
 
-    <p><strong>Low: Information disclosure</strong>
-       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2526";
-       rel="nofollow">CVE-2011-2526</a></p>
-
-    <p>Tomcat provides support for sendfile with the HTTP NIO and HTTP APR
-       connectors. sendfile is used automatically for content served via the
-       DefaultServlet and deployed web applications may use it directly via
-       setting request attributes. These request attributes were not validated.
-       When running under a security manager, this lack of validation allowed a
-       malicious web application to do one or more of the following that would
-       normally be prevented by a security manager:
-       <ul>
-         <li>return files to users that the security manager should make
-             inaccessible</li>
-         <li>terminate (via a crash) the JVM</li>
-       </ul>
-       Additionally, these vulnerabilities only occur when all of the following
-       are true:
-       <ul>
-         <li>untrusted web applications are being used</li>
-         <li>the SecurityManager is used to limit the untrusted web 
applications
-             </li>
-         <li>the HTTP NIO or HTTP APR connector is used</li>
-         <li>sendfile is enabled for the connector (this is the default)</li>
-       </ul>
-    </p>
-
-    <p>There is a <a 
href="http://people.apache.org/~markt/patches/2011-07-13-cve-2011-2526-tc5.patch";>
-       proposed patch</a> for this issue.</p>
-
-    <p>This was identified by the Tomcat security team on 7 July 2011 and
-       made public on 13 July 2011.</p>
-
-    <p>Affects: 5.5.0-5.5.33</p>
-
     <p><strong>Important: Information disclosure</strong>
        <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2729";
        rel="nofollow">CVE-2011-2729</a></p>
@@ -135,6 +100,42 @@
 
     <p>Affects: 5.5.0-5.5.33</p>
   
+    <p><strong>Low: Information disclosure</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2526";
+       rel="nofollow">CVE-2011-2526</a></p>
+
+    <p>Tomcat provides support for sendfile with the HTTP APR
+       connector. sendfile is used automatically for content served via the
+       DefaultServlet and deployed web applications may use it directly via
+       setting request attributes. These request attributes were not validated.
+       When running under a security manager, this lack of validation allowed a
+       malicious web application to do one or more of the following that would
+       normally be prevented by a security manager:
+       <ul>
+         <li>return files to users that the security manager should make
+             inaccessible</li>
+         <li>terminate (via a crash) the JVM</li>
+       </ul>
+       Additionally, these vulnerabilities only occur when all of the following
+       are true:
+       <ul>
+         <li>untrusted web applications are being used</li>
+         <li>the SecurityManager is used to limit the untrusted web 
applications
+             </li>
+         <li>the HTTP APR connector is used</li>
+         <li>sendfile is enabled for the connector (this is the default)</li>
+       </ul>
+    </p>
+
+    <p>This was fixed in
+       <a href="http://svn.apache.org/viewvc?rev=1158244&amp;view=rev";>
+       revision 1158244</a>.</p>
+
+    <p>This was identified by the Tomcat security team on 7 July 2011 and
+       made public on 13 July 2011.</p>
+
+    <p>Affects: 5.5.0-5.5.33</p>
+
   </section>
 
   <section name="Fixed in Apache Tomcat 5.5.32" rtext="released 1 Feb 2011">



---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org

Reply via email to