Author: markt Date: Mon Feb 23 22:34:57 2015 New Revision: 1661805 URL: http://svn.apache.org/r1661805 Log: issues.a.o -> bz.a.o
Modified: tomcat/site/trunk/docs/bugreport.html tomcat/site/trunk/docs/download-native.html tomcat/site/trunk/docs/getinvolved.html tomcat/site/trunk/docs/index.html tomcat/site/trunk/docs/maven-plugin.html tomcat/site/trunk/docs/migration-7.html tomcat/site/trunk/docs/oldnews-2013.html tomcat/site/trunk/docs/oldnews-2014.html tomcat/site/trunk/docs/oldnews.html tomcat/site/trunk/docs/security-4.html tomcat/site/trunk/docs/security-5.html tomcat/site/trunk/docs/security-6.html tomcat/site/trunk/docs/security-7.html tomcat/site/trunk/xdocs/bugreport.xml tomcat/site/trunk/xdocs/getinvolved.xml tomcat/site/trunk/xdocs/maven-plugin.xml tomcat/site/trunk/xdocs/migration-7.xml tomcat/site/trunk/xdocs/oldnews-2013.xml tomcat/site/trunk/xdocs/oldnews-2014.xml tomcat/site/trunk/xdocs/security-4.xml tomcat/site/trunk/xdocs/security-5.xml tomcat/site/trunk/xdocs/security-6.xml tomcat/site/trunk/xdocs/security-7.xml tomcat/site/trunk/xdocs/stylesheets/tomcat-site.xsl Modified: tomcat/site/trunk/docs/bugreport.html URL: http://svn.apache.org/viewvc/tomcat/site/trunk/docs/bugreport.html?rev=1661805&r1=1661804&r2=1661805&view=diff ============================================================================== --- tomcat/site/trunk/docs/bugreport.html (original) +++ tomcat/site/trunk/docs/bugreport.html Mon Feb 23 22:34:57 2015 @@ -425,9 +425,9 @@ problem you are having before reporting </ul> <p>The search page is - <a href="https://issues.apache.org/bugzilla/query.cgi">here</a>. + <a href="https://bz.apache.org/bugzilla/query.cgi">here</a>. There is also - <a href="https://issues.apache.org/bugzilla/query.cgi?format=advanced">advanced</a> + <a href="https://bz.apache.org/bugzilla/query.cgi?format=advanced">advanced</a> search page. </p> @@ -720,7 +720,7 @@ problem you are having before reporting <p>Tomcat <a href="http://tomcat.apache.org/maven-plugin.html">Maven plugin</a> subproject tracks its issues in - <a href="https://issues.apache.org/jira/browse/MTOMCAT">JIRA database</a>. + <a href="https://bz.apache.org/jira/browse/MTOMCAT">JIRA database</a>. </p> </li> @@ -751,12 +751,12 @@ bug in your web application.</p> <p>Please provide as much information as possible. It is very hard to fix a bug if the person looking into the problem cannot reproduce it. See also - <a href="https://issues.apache.org/bugzilla/page.cgi?id=bug-writing.html">Bug Writing Guidelines</a>. + <a href="https://bz.apache.org/bugzilla/page.cgi?id=bug-writing.html">Bug Writing Guidelines</a>. </p> <p>Bug submission starts - <a href="https://issues.apache.org/bugzilla/enter_bug.cgi">here</a>. + <a href="https://bz.apache.org/bugzilla/enter_bug.cgi">here</a>. You have to include the following information in your bug report:</p> <ul> Modified: tomcat/site/trunk/docs/download-native.html URL: http://svn.apache.org/viewvc/tomcat/site/trunk/docs/download-native.html?rev=1661805&r1=1661804&r2=1661805&view=diff ============================================================================== --- tomcat/site/trunk/docs/download-native.html (original) +++ tomcat/site/trunk/docs/download-native.html Mon Feb 23 22:34:57 2015 @@ -319,7 +319,7 @@ version of library is included in Apache Tomcat distributions. b) OCSP-enabled. This one has enabled (experimental) support for verification of client SSL certificates via OCSP - protocol (<a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=45392">45392</a>). + protocol (<a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=45392">45392</a>). </p> <p>Each archive contains <code>tcnative-1.dll</code> for 32-bit, Modified: tomcat/site/trunk/docs/getinvolved.html URL: http://svn.apache.org/viewvc/tomcat/site/trunk/docs/getinvolved.html?rev=1661805&r1=1661804&r2=1661805&view=diff ============================================================================== --- tomcat/site/trunk/docs/getinvolved.html (original) +++ tomcat/site/trunk/docs/getinvolved.html Mon Feb 23 22:34:57 2015 @@ -213,7 +213,7 @@ few areas ways in which you can help:</p Apache Tomcat user documentation.</li> <li> -<a href="https://issues.apache.org/bugzilla/">Investigate bugs</a> that have +<a href="https://bz.apache.org/bugzilla/">Investigate bugs</a> that have been reported and provide patches where appropriate.</li> <li>Help with development for the next release of the Servlet and JSP Modified: tomcat/site/trunk/docs/index.html URL: http://svn.apache.org/viewvc/tomcat/site/trunk/docs/index.html?rev=1661805&r1=1661804&r2=1661805&view=diff ============================================================================== --- tomcat/site/trunk/docs/index.html (original) +++ tomcat/site/trunk/docs/index.html Mon Feb 23 22:34:57 2015 @@ -268,7 +268,7 @@ notable changes since 8.0.17 include:</p <ul> <li>A regression that caused response truncation when using forwarding - (<a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=57475">57475</a>) has been fixed.</li> + (<a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=57475">57475</a>) has been fixed.</li> <li>Various improvements to ReplicatedMap in Tribes.</li> Modified: tomcat/site/trunk/docs/maven-plugin.html URL: http://svn.apache.org/viewvc/tomcat/site/trunk/docs/maven-plugin.html?rev=1661805&r1=1661804&r2=1661805&view=diff ============================================================================== --- tomcat/site/trunk/docs/maven-plugin.html (original) +++ tomcat/site/trunk/docs/maven-plugin.html Mon Feb 23 22:34:57 2015 @@ -245,7 +245,7 @@ <p> The Bug Tracker to use is the ASF Jira instance: - <a href="https://issues.apache.org/jira/browse/MTOMCAT">https://issues.apache.org/jira/browse/MTOMCAT</a> + <a href="https://bz.apache.org/jira/browse/MTOMCAT">https://bz.apache.org/jira/browse/MTOMCAT</a> </p> Modified: tomcat/site/trunk/docs/migration-7.html URL: http://svn.apache.org/viewvc/tomcat/site/trunk/docs/migration-7.html?rev=1661805&r1=1661804&r2=1661805&view=diff ============================================================================== --- tomcat/site/trunk/docs/migration-7.html (original) +++ tomcat/site/trunk/docs/migration-7.html Mon Feb 23 22:34:57 2015 @@ -409,7 +409,7 @@ of Apache Tomcat.</p> regardless of the value of the <code>Host</code>'s <code>unpackWARs</code> setting in versions 7.0.12 to 7.0.47 inclusive. Note that this unpacking is only supported in 7.0.48 onwards. See issue - <a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=51294#c1">51294</a>. + <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=51294#c1">51294</a>. </p> </div> @@ -790,9 +790,9 @@ of Apache Tomcat.</p> difference is that Filters defined in the global <code>conf/web.xml</code> now follow the ones defined in a web application, instead of preceding them. See issues - <a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=51754#c1">51754</a> + <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=51754#c1">51754</a> and - <a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=52138#c4">52138</a> + <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=52138#c4">52138</a> for clarifications.</p> @@ -828,7 +828,7 @@ of Apache Tomcat.</p> Note, that upon clarification from the Servlet EG, even applications using Servlet 2.4 and older versions of specification are being scanned. See issue - <a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=53619">53619</a> + <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=53619">53619</a> and related discussions on the users mailing list. </p> Modified: tomcat/site/trunk/docs/oldnews-2013.html URL: http://svn.apache.org/viewvc/tomcat/site/trunk/docs/oldnews-2013.html?rev=1661805&r1=1661804&r2=1661805&view=diff ============================================================================== --- tomcat/site/trunk/docs/oldnews-2013.html (original) +++ tomcat/site/trunk/docs/oldnews-2013.html Mon Feb 23 22:34:57 2015 @@ -585,7 +585,7 @@ and improvements compared to version 7.0 <ul> -<li>A fix for CVE-2013-2071 (bug <a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=54178">54178</a>) an information disclosure +<li>A fix for CVE-2013-2071 (bug <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=54178">54178</a>) an information disclosure issue.</li> <li>Various fixes to stop Tomcat attempting to parse text that looks like an EL @@ -740,7 +740,7 @@ improvements compared to version 7.0.35. <li>Fix the regression in the JspC tool that is used to pre-compile JSP pages introduced in 7.0.35. See - <a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=54440">issue + <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=54440">issue 54440</a> for details. Patch provided by Sheldon Shao.</li> <li>Improve handling of <code>ciphers</code> and @@ -802,7 +802,7 @@ Full details of these changes, and all t <p> <strong>Notice:</strong> The JspC tool that is used to pre-compile JSP pages is broken in this release. See -<a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=54440">issue 54440</a> +<a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=54440">issue 54440</a> for details. </p> Modified: tomcat/site/trunk/docs/oldnews-2014.html URL: http://svn.apache.org/viewvc/tomcat/site/trunk/docs/oldnews-2014.html?rev=1661805&r1=1661804&r2=1661805&view=diff ============================================================================== --- tomcat/site/trunk/docs/oldnews-2014.html (original) +++ tomcat/site/trunk/docs/oldnews-2014.html Mon Feb 23 22:34:57 2015 @@ -407,7 +407,7 @@ http://tomcat.apache.org/tomcat-8.0-doc/ <p> NOTE: A regression has been reported in 8.0.11 ( -<a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=56882">bug +<a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=56882">bug 56882</a>). A 8.0.12 release is expected in the next week or so to address this. </p> @@ -475,9 +475,9 @@ Tomcat Native. The notable changes since <li>Windows binaries are linked with OpenSSL 1.0.1h. This provides a fix for <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224" rel="nofollow">CVE-2014-0224</a>, an OpenSSL MITM vulnerability. - (<a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=56596">56596</a>)</li> + (<a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=56596">56596</a>)</li> -<li>Resolve an issue when using FIPS mode. (<a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=56396">56396</a>)</li> +<li>Resolve an issue when using FIPS mode. (<a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=56396">56396</a>)</li> </ul> @@ -696,7 +696,7 @@ Tomcat Native. The notable changes since (<a href="https://wiki.apache.org/tomcat/Security/Heartbleed">Heartbleed</a>) SSL vulnerability.</li> -<li>Add support for ECDHE ciphers. (<a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=55915">55915</a>)</li> +<li>Add support for ECDHE ciphers. (<a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=55915">55915</a>)</li> </ul> Modified: tomcat/site/trunk/docs/oldnews.html URL: http://svn.apache.org/viewvc/tomcat/site/trunk/docs/oldnews.html?rev=1661805&r1=1661804&r2=1661805&view=diff ============================================================================== --- tomcat/site/trunk/docs/oldnews.html (original) +++ tomcat/site/trunk/docs/oldnews.html Mon Feb 23 22:34:57 2015 @@ -246,7 +246,7 @@ notable changes since 8.0.15 include:</p <p> <strong>Warning:</strong> The following notable bug was found in 8.0.17: -<a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=57476">57476</a>: some HTTP responses may be truncated. The team works +<a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=57476">57476</a>: some HTTP responses may be truncated. The team works on preparing the next release (8.0.18) to address this issue. </p> Modified: tomcat/site/trunk/docs/security-4.html URL: http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-4.html?rev=1661805&r1=1661804&r2=1661805&view=diff ============================================================================== --- tomcat/site/trunk/docs/security-4.html (original) +++ tomcat/site/trunk/docs/security-4.html Mon Feb 23 22:34:57 2015 @@ -387,7 +387,7 @@ </p> -<p>Bugs <a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=29936">29936</a> and <a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=45933">45933</a> +<p>Bugs <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=29936">29936</a> and <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=45933">45933</a> allowed a web application to replace the XML parser used by Tomcat to process web.xml and tld files. In limited circumstances these bugs may allow a rogue web application to view and/or alter the web.xml @@ -718,7 +718,7 @@ <p> -<a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=40771">Bug +<a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=40771">Bug 40771</a> may result in the disclosure of POSTed content from a previous request. For a vulnerability to exist, the content read from the input stream must be disclosed, eg via writing it to the response and committing @@ -740,7 +740,7 @@ <p> -<a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=25835"> +<a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=25835"> Bug 25835</a> can, in rare circumstances - this has only been reproduced using a debugger to force a particular processing sequence for two threads - allow a user from a non-permitted IP address to gain access to a context Modified: tomcat/site/trunk/docs/security-5.html URL: http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-5.html?rev=1661805&r1=1661804&r2=1661805&view=diff ============================================================================== --- tomcat/site/trunk/docs/security-5.html (original) +++ tomcat/site/trunk/docs/security-5.html Mon Feb 23 22:34:57 2015 @@ -967,7 +967,7 @@ </p> -<p>Bugs <a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=29936">29936</a> and <a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=45933">45933</a> allowed a web application +<p>Bugs <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=29936">29936</a> and <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=45933">45933</a> allowed a web application to replace the XML parser used by Tomcat to process web.xml, context.xml and tld files. In limited circumstances these bugs may allow a rogue web application to view and/or @@ -1356,7 +1356,7 @@ <p> -<a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=40771">Bug +<a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=40771">Bug 40771</a> may result in the disclosure of POSTed content from a previous request. For a vulnerability to exist, the content read from the input stream must be disclosed, eg via writing it to the response and committing @@ -1487,7 +1487,7 @@ <p> -<a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=25835"> +<a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=25835"> Bug 25835</a> can, in rare circumstances - this has only been reproduced using a debugger to force a particular processing sequence for two threads - allow a user from a non-permitted IP address to gain access to a context Modified: tomcat/site/trunk/docs/security-6.html URL: http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-6.html?rev=1661805&r1=1661804&r2=1661805&view=diff ============================================================================== --- tomcat/site/trunk/docs/security-6.html (original) +++ tomcat/site/trunk/docs/security-6.html Mon Feb 23 22:34:57 2015 @@ -788,7 +788,7 @@ <p>When using the NIO connector with sendfile and HTTPS enabled, if a client breaks the connection while reading the response an infinite loop is entered leading to a denial of service. This was originally reported as - <a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=52858">bug + <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=52858">bug 52858</a>. </p> @@ -1527,7 +1527,7 @@ </p> -<p>Bugs <a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=29936">29936</a> and <a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=45933">45933</a> allowed a web application +<p>Bugs <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=29936">29936</a> and <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=45933">45933</a> allowed a web application to replace the XML parser used by Tomcat to process web.xml, context.xml and tld files. In limited circumstances these bugs may allow a rogue web application to view and/or @@ -1945,7 +1945,7 @@ there is no magic solution. This issue has been discussed several times on the Tomcat mailing lists. The best place to start to review these discussions is the report for - <a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=54263">bug + <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=54263">bug 54236</a>.</p> Modified: tomcat/site/trunk/docs/security-7.html URL: http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-7.html?rev=1661805&r1=1661804&r2=1661805&view=diff ============================================================================== --- tomcat/site/trunk/docs/security-7.html (original) +++ tomcat/site/trunk/docs/security-7.html Mon Feb 23 22:34:57 2015 @@ -642,7 +642,7 @@ </p> -<p>Bug <a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=54178">54178</a> described a scenario where elements of a previous +<p>Bug <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=54178">54178</a> described a scenario where elements of a previous request may be exposed to a current request. This was very difficult to exploit deliberately but fairly likely to happen unexpectedly if an application used AsyncListeners that threw RuntimeExceptions.</p> @@ -920,7 +920,7 @@ <p>When using the NIO connector with sendfile and HTTPS enabled, if a client breaks the connection while reading the response an infinite loop is entered leading to a denial of service. This was originally reported as - <a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=52858">bug + <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=52858">bug 52858</a>. </p> @@ -1268,7 +1268,7 @@ <p>The re-factoring of XML validation for Tomcat 7.0.x re-introduced the vulnerability previously reported as <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0783" rel="nofollow">CVE-2009-0783</a>. This was initially - <a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=51395"> + <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=51395"> reported</a> as a memory leak. If a web application is the first web application loaded, this bugs allows that web application to potentially view and/or alter the web.xml, context.xml and tld files of other web @@ -1646,7 +1646,7 @@ there is no magic solution. This issue has been discussed several times on the Tomcat mailing lists. The best place to start to review these discussions is the report for - <a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=54263">bug + <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=54263">bug 54236</a>.</p> Modified: tomcat/site/trunk/xdocs/bugreport.xml URL: http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/bugreport.xml?rev=1661805&r1=1661804&r2=1661805&view=diff ============================================================================== --- tomcat/site/trunk/xdocs/bugreport.xml (original) +++ tomcat/site/trunk/xdocs/bugreport.xml Mon Feb 23 22:34:57 2015 @@ -121,9 +121,9 @@ problem you are having before reporting information to help reproduce and resolve the bug.</li> </ul> <p>The search page is - <a href="https://issues.apache.org/bugzilla/query.cgi">here</a>. + <a href="https://bz.apache.org/bugzilla/query.cgi">here</a>. There is also - <a href="https://issues.apache.org/bugzilla/query.cgi?format=advanced">advanced</a> + <a href="https://bz.apache.org/bugzilla/query.cgi?format=advanced">advanced</a> search page. </p> <p>Here are some search tips.</p> @@ -312,7 +312,7 @@ problem you are having before reporting <li><p>Tomcat <a href="http://tomcat.apache.org/maven-plugin.html">Maven plugin</a> subproject tracks its issues in - <a href="https://issues.apache.org/jira/browse/MTOMCAT">JIRA database</a>. + <a href="https://bz.apache.org/jira/browse/MTOMCAT">JIRA database</a>. </p> </li> @@ -336,11 +336,11 @@ bug in your web application.</p> <p>Please provide as much information as possible. It is very hard to fix a bug if the person looking into the problem cannot reproduce it. See also - <a href="https://issues.apache.org/bugzilla/page.cgi?id=bug-writing.html">Bug Writing Guidelines</a>. + <a href="https://bz.apache.org/bugzilla/page.cgi?id=bug-writing.html">Bug Writing Guidelines</a>. </p> <p>Bug submission starts - <a href="https://issues.apache.org/bugzilla/enter_bug.cgi">here</a>. + <a href="https://bz.apache.org/bugzilla/enter_bug.cgi">here</a>. You have to include the following information in your bug report:</p> <ul> <li><p><b>Product</b>. Here is a list of supported products:</p> Modified: tomcat/site/trunk/xdocs/getinvolved.xml URL: http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/getinvolved.xml?rev=1661805&r1=1661804&r2=1661805&view=diff ============================================================================== --- tomcat/site/trunk/xdocs/getinvolved.xml (original) +++ tomcat/site/trunk/xdocs/getinvolved.xml Mon Feb 23 22:34:57 2015 @@ -21,7 +21,7 @@ few areas ways in which you can help:</p <a href="http://wiki.apache.org/tomcat/FrontPage">Wiki</a>.</li> <li>Contribute other documentation patches, either for the website or for the Apache Tomcat user documentation.</li> - <li><a href="https://issues.apache.org/bugzilla/">Investigate bugs</a> that have + <li><a href="https://bz.apache.org/bugzilla/">Investigate bugs</a> that have been reported and provide patches where appropriate.</li> <li>Help with development for the next release of the Servlet and JSP specifications.</li> Modified: tomcat/site/trunk/xdocs/maven-plugin.xml URL: http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/maven-plugin.xml?rev=1661805&r1=1661804&r2=1661805&view=diff ============================================================================== --- tomcat/site/trunk/xdocs/maven-plugin.xml (original) +++ tomcat/site/trunk/xdocs/maven-plugin.xml Mon Feb 23 22:34:57 2015 @@ -36,7 +36,7 @@ <subsection name="Bug Tracker"> <p> The Bug Tracker to use is the ASF Jira instance: - <a href="https://issues.apache.org/jira/browse/MTOMCAT">https://issues.apache.org/jira/browse/MTOMCAT</a> + <a href="https://bz.apache.org/jira/browse/MTOMCAT">https://bz.apache.org/jira/browse/MTOMCAT</a> </p> </subsection> Modified: tomcat/site/trunk/xdocs/migration-7.xml URL: http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/migration-7.xml?rev=1661805&r1=1661804&r2=1661805&view=diff ============================================================================== --- tomcat/site/trunk/xdocs/migration-7.xml (original) +++ tomcat/site/trunk/xdocs/migration-7.xml Mon Feb 23 22:34:57 2015 @@ -100,7 +100,7 @@ of Apache Tomcat.</p> regardless of the value of the <code>Host</code>'s <code>unpackWARs</code> setting in versions 7.0.12 to 7.0.47 inclusive. Note that this unpacking is only supported in 7.0.48 onwards. See issue - <a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=51294#c1">51294</a>. + <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=51294#c1">51294</a>. </p> </subsection> @@ -349,9 +349,9 @@ of Apache Tomcat.</p> difference is that Filters defined in the global <code>conf/web.xml</code> now follow the ones defined in a web application, instead of preceding them. See issues - <a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=51754#c1">51754</a> + <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=51754#c1">51754</a> and - <a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=52138#c4">52138</a> + <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=52138#c4">52138</a> for clarifications.</p> </subsection> @@ -375,7 +375,7 @@ of Apache Tomcat.</p> Note, that upon clarification from the Servlet EG, even applications using Servlet 2.4 and older versions of specification are being scanned. See issue - <a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=53619">53619</a> + <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=53619">53619</a> and related discussions on the users mailing list. </p> Modified: tomcat/site/trunk/xdocs/oldnews-2013.xml URL: http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/oldnews-2013.xml?rev=1661805&r1=1661804&r2=1661805&view=diff ============================================================================== --- tomcat/site/trunk/xdocs/oldnews-2013.xml (original) +++ tomcat/site/trunk/xdocs/oldnews-2013.xml Mon Feb 23 22:34:57 2015 @@ -396,7 +396,7 @@ improvements compared to version 7.0.35. <ul> <li>Fix the regression in the JspC tool that is used to pre-compile JSP pages introduced in 7.0.35. See - <a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=54440">issue + <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=54440">issue 54440</a> for details. Patch provided by Sheldon Shao.</li> <li>Improve handling of <code>ciphers</code> and <code>sslEnabledProtocols</code> options for the BIO and NIO connectors. The @@ -442,7 +442,7 @@ Full details of these changes, and all t <p><strong>Notice:</strong> The JspC tool that is used to pre-compile JSP pages is broken in this release. See -<a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=54440">issue 54440</a> +<a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=54440">issue 54440</a> for details. </p> Modified: tomcat/site/trunk/xdocs/oldnews-2014.xml URL: http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/oldnews-2014.xml?rev=1661805&r1=1661804&r2=1661805&view=diff ============================================================================== --- tomcat/site/trunk/xdocs/oldnews-2014.xml (original) +++ tomcat/site/trunk/xdocs/oldnews-2014.xml Mon Feb 23 22:34:57 2015 @@ -153,7 +153,7 @@ http://tomcat.apache.org/tomcat-8.0-doc/ </p> <p> NOTE: A regression has been reported in 8.0.11 ( -<a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=56882">bug +<a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=56882">bug 56882</a>). A 8.0.12 release is expected in the next week or so to address this. </p> <p> Modified: tomcat/site/trunk/xdocs/security-4.xml URL: http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-4.xml?rev=1661805&r1=1661804&r2=1661805&view=diff ============================================================================== --- tomcat/site/trunk/xdocs/security-4.xml (original) +++ tomcat/site/trunk/xdocs/security-4.xml Mon Feb 23 22:34:57 2015 @@ -339,7 +339,7 @@ <p><strong>Low: Information disclosure</strong> <cve>CVE-2008-4308</cve></p> - <p><a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=40771">Bug + <p><a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=40771">Bug 40771</a> may result in the disclosure of POSTed content from a previous request. For a vulnerability to exist, the content read from the input stream must be disclosed, eg via writing it to the response and committing @@ -354,7 +354,7 @@ <p><strong>Low: Information disclosure</strong> <cve>CVE-2008-3271</cve></p> - <p><a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=25835"> + <p><a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=25835"> Bug 25835</a> can, in rare circumstances - this has only been reproduced using a debugger to force a particular processing sequence for two threads - allow a user from a non-permitted IP address to gain access to a context Modified: tomcat/site/trunk/xdocs/security-5.xml URL: http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-5.xml?rev=1661805&r1=1661804&r2=1661805&view=diff ============================================================================== --- tomcat/site/trunk/xdocs/security-5.xml (original) +++ tomcat/site/trunk/xdocs/security-5.xml Mon Feb 23 22:34:57 2015 @@ -777,7 +777,7 @@ <p><strong>Low: Information disclosure</strong> <cve>CVE-2008-4308</cve></p> - <p><a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=40771">Bug + <p><a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=40771">Bug 40771</a> may result in the disclosure of POSTed content from a previous request. For a vulnerability to exist, the content read from the input stream must be disclosed, eg via writing it to the response and committing @@ -866,7 +866,7 @@ <p><strong>Low: Information disclosure</strong> <cve>CVE-2008-3271</cve></p> - <p><a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=25835"> + <p><a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=25835"> Bug 25835</a> can, in rare circumstances - this has only been reproduced using a debugger to force a particular processing sequence for two threads - allow a user from a non-permitted IP address to gain access to a context Modified: tomcat/site/trunk/xdocs/security-6.xml URL: http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-6.xml?rev=1661805&r1=1661804&r2=1661805&view=diff ============================================================================== --- tomcat/site/trunk/xdocs/security-6.xml (original) +++ tomcat/site/trunk/xdocs/security-6.xml Mon Feb 23 22:34:57 2015 @@ -379,7 +379,7 @@ <p>When using the NIO connector with sendfile and HTTPS enabled, if a client breaks the connection while reading the response an infinite loop is entered leading to a denial of service. This was originally reported as - <a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=52858">bug + <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=52858">bug 52858</a>. </p> @@ -1179,7 +1179,7 @@ there is no magic solution. This issue has been discussed several times on the Tomcat mailing lists. The best place to start to review these discussions is the report for - <a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=54263">bug + <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=54263">bug 54236</a>.</p> <p>This was first discussed on the public Tomcat users mailing list on 19 Modified: tomcat/site/trunk/xdocs/security-7.xml URL: http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-7.xml?rev=1661805&r1=1661804&r2=1661805&view=diff ============================================================================== --- tomcat/site/trunk/xdocs/security-7.xml (original) +++ tomcat/site/trunk/xdocs/security-7.xml Mon Feb 23 22:34:57 2015 @@ -463,7 +463,7 @@ <p>When using the NIO connector with sendfile and HTTPS enabled, if a client breaks the connection while reading the response an infinite loop is entered leading to a denial of service. This was originally reported as - <a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=52858">bug + <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=52858">bug 52858</a>. </p> @@ -704,7 +704,7 @@ <p>The re-factoring of XML validation for Tomcat 7.0.x re-introduced the vulnerability previously reported as <cve>CVE-2009-0783</cve>. This was initially - <a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=51395"> + <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=51395"> reported</a> as a memory leak. If a web application is the first web application loaded, this bugs allows that web application to potentially view and/or alter the web.xml, context.xml and tld files of other web @@ -976,7 +976,7 @@ there is no magic solution. This issue has been discussed several times on the Tomcat mailing lists. The best place to start to review these discussions is the report for - <a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=54263">bug + <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=54263">bug 54236</a>.</p> <p>This was first discussed on the public Tomcat users mailing list on 19 Modified: tomcat/site/trunk/xdocs/stylesheets/tomcat-site.xsl URL: http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/stylesheets/tomcat-site.xsl?rev=1661805&r1=1661804&r2=1661805&view=diff ============================================================================== --- tomcat/site/trunk/xdocs/stylesheets/tomcat-site.xsl (original) +++ tomcat/site/trunk/xdocs/stylesheets/tomcat-site.xsl Mon Feb 23 22:34:57 2015 @@ -34,7 +34,7 @@ <!-- Defined parameters (overrideable) --> <xsl:param name="relative-path" select="'.'"/> <xsl:param name="home-logo" select="'/images/tomcat.png'"/> - <xsl:param name="buglink" select="'https://issues.apache.org/bugzilla/show_bug.cgi?id='"/> + <xsl:param name="buglink" select="'https://bz.apache.org/bugzilla/show_bug.cgi?id='"/> <xsl:param name="revlink" select="'http://svn.apache.org/viewvc?view=rev&rev='"/> <xsl:param name="cvelink" select="'http://cve.mitre.org/cgi-bin/cvename.cgi?name='"/> --------------------------------------------------------------------- To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org For additional commands, e-mail: dev-h...@tomcat.apache.org