Author: markt Date: Tue Aug 16 12:53:02 2011 New Revision: 1158247 URL: http://svn.apache.org/viewvc?rev=1158247&view=rev Log: Update now patch has been applied to 5.5.x
Modified: tomcat/site/trunk/docs/security-5.html tomcat/site/trunk/xdocs/security-5.xml Modified: tomcat/site/trunk/docs/security-5.html URL: http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-5.html?rev=1158247&r1=1158246&r2=1158247&view=diff ============================================================================== --- tomcat/site/trunk/docs/security-5.html (original) +++ tomcat/site/trunk/docs/security-5.html Tue Aug 16 12:53:02 2011 @@ -355,42 +355,6 @@ <blockquote> <p> -<strong>Low: Information disclosure</strong> - <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2526" rel="nofollow">CVE-2011-2526</a> -</p> - - <p>Tomcat provides support for sendfile with the HTTP NIO and HTTP APR - connectors. sendfile is used automatically for content served via the - DefaultServlet and deployed web applications may use it directly via - setting request attributes. These request attributes were not validated. - When running under a security manager, this lack of validation allowed a - malicious web application to do one or more of the following that would - normally be prevented by a security manager: - <ul> - <li>return files to users that the security manager should make - inaccessible</li> - <li>terminate (via a crash) the JVM</li> - </ul> - Additionally, these vulnerabilities only occur when all of the following - are true: - <ul> - <li>untrusted web applications are being used</li> - <li>the SecurityManager is used to limit the untrusted web applications - </li> - <li>the HTTP NIO or HTTP APR connector is used</li> - <li>sendfile is enabled for the connector (this is the default)</li> - </ul> - </p> - - <p>There is a <a href="http://people.apache.org/~markt/patches/2011-07-13-cve-2011-2526-tc5.patch"> - proposed patch</a> for this issue.</p> - - <p>This was identified by the Tomcat security team on 7 July 2011 and - made public on 13 July 2011.</p> - - <p>Affects: 5.5.0-5.5.33</p> - - <p> <strong>Important: Information disclosure</strong> <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2729" rel="nofollow">CVE-2011-2729</a> </p> @@ -468,6 +432,43 @@ <p>Affects: 5.5.0-5.5.33</p> + <p> +<strong>Low: Information disclosure</strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2526" rel="nofollow">CVE-2011-2526</a> +</p> + + <p>Tomcat provides support for sendfile with the HTTP APR + connector. sendfile is used automatically for content served via the + DefaultServlet and deployed web applications may use it directly via + setting request attributes. These request attributes were not validated. + When running under a security manager, this lack of validation allowed a + malicious web application to do one or more of the following that would + normally be prevented by a security manager: + <ul> + <li>return files to users that the security manager should make + inaccessible</li> + <li>terminate (via a crash) the JVM</li> + </ul> + Additionally, these vulnerabilities only occur when all of the following + are true: + <ul> + <li>untrusted web applications are being used</li> + <li>the SecurityManager is used to limit the untrusted web applications + </li> + <li>the HTTP APR connector is used</li> + <li>sendfile is enabled for the connector (this is the default)</li> + </ul> + </p> + + <p>This was fixed in + <a href="http://svn.apache.org/viewvc?rev=1158244&view=rev"> + revision 1158244</a>.</p> + + <p>This was identified by the Tomcat security team on 7 July 2011 and + made public on 13 July 2011.</p> + + <p>Affects: 5.5.0-5.5.33</p> + </blockquote> </p> </td> Modified: tomcat/site/trunk/xdocs/security-5.xml URL: http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-5.xml?rev=1158247&r1=1158246&r2=1158247&view=diff ============================================================================== --- tomcat/site/trunk/xdocs/security-5.xml (original) +++ tomcat/site/trunk/xdocs/security-5.xml Tue Aug 16 12:53:02 2011 @@ -48,41 +48,6 @@ <section name="To be fixed in Apache Tomcat 5.5.34 (not yet released)"> - <p><strong>Low: Information disclosure</strong> - <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2526" - rel="nofollow">CVE-2011-2526</a></p> - - <p>Tomcat provides support for sendfile with the HTTP NIO and HTTP APR - connectors. sendfile is used automatically for content served via the - DefaultServlet and deployed web applications may use it directly via - setting request attributes. These request attributes were not validated. - When running under a security manager, this lack of validation allowed a - malicious web application to do one or more of the following that would - normally be prevented by a security manager: - <ul> - <li>return files to users that the security manager should make - inaccessible</li> - <li>terminate (via a crash) the JVM</li> - </ul> - Additionally, these vulnerabilities only occur when all of the following - are true: - <ul> - <li>untrusted web applications are being used</li> - <li>the SecurityManager is used to limit the untrusted web applications - </li> - <li>the HTTP NIO or HTTP APR connector is used</li> - <li>sendfile is enabled for the connector (this is the default)</li> - </ul> - </p> - - <p>There is a <a href="http://people.apache.org/~markt/patches/2011-07-13-cve-2011-2526-tc5.patch"> - proposed patch</a> for this issue.</p> - - <p>This was identified by the Tomcat security team on 7 July 2011 and - made public on 13 July 2011.</p> - - <p>Affects: 5.5.0-5.5.33</p> - <p><strong>Important: Information disclosure</strong> <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2729" rel="nofollow">CVE-2011-2729</a></p> @@ -135,6 +100,42 @@ <p>Affects: 5.5.0-5.5.33</p> + <p><strong>Low: Information disclosure</strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2526" + rel="nofollow">CVE-2011-2526</a></p> + + <p>Tomcat provides support for sendfile with the HTTP APR + connector. sendfile is used automatically for content served via the + DefaultServlet and deployed web applications may use it directly via + setting request attributes. These request attributes were not validated. + When running under a security manager, this lack of validation allowed a + malicious web application to do one or more of the following that would + normally be prevented by a security manager: + <ul> + <li>return files to users that the security manager should make + inaccessible</li> + <li>terminate (via a crash) the JVM</li> + </ul> + Additionally, these vulnerabilities only occur when all of the following + are true: + <ul> + <li>untrusted web applications are being used</li> + <li>the SecurityManager is used to limit the untrusted web applications + </li> + <li>the HTTP APR connector is used</li> + <li>sendfile is enabled for the connector (this is the default)</li> + </ul> + </p> + + <p>This was fixed in + <a href="http://svn.apache.org/viewvc?rev=1158244&view=rev"> + revision 1158244</a>.</p> + + <p>This was identified by the Tomcat security team on 7 July 2011 and + made public on 13 July 2011.</p> + + <p>Affects: 5.5.0-5.5.33</p> + </section> <section name="Fixed in Apache Tomcat 5.5.32" rtext="released 1 Feb 2011"> --------------------------------------------------------------------- To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org For additional commands, e-mail: dev-h...@tomcat.apache.org