Author: markt
Date: Mon Feb 23 22:34:57 2015
New Revision: 1661805
URL: http://svn.apache.org/r1661805
Log:
issues.a.o -> bz.a.o
Modified:
tomcat/site/trunk/docs/bugreport.html
tomcat/site/trunk/docs/download-native.html
tomcat/site/trunk/docs/getinvolved.html
tomcat/site/trunk/docs/index.html
tomcat/site/trunk/docs/maven-plugin.html
tomcat/site/trunk/docs/migration-7.html
tomcat/site/trunk/docs/oldnews-2013.html
tomcat/site/trunk/docs/oldnews-2014.html
tomcat/site/trunk/docs/oldnews.html
tomcat/site/trunk/docs/security-4.html
tomcat/site/trunk/docs/security-5.html
tomcat/site/trunk/docs/security-6.html
tomcat/site/trunk/docs/security-7.html
tomcat/site/trunk/xdocs/bugreport.xml
tomcat/site/trunk/xdocs/getinvolved.xml
tomcat/site/trunk/xdocs/maven-plugin.xml
tomcat/site/trunk/xdocs/migration-7.xml
tomcat/site/trunk/xdocs/oldnews-2013.xml
tomcat/site/trunk/xdocs/oldnews-2014.xml
tomcat/site/trunk/xdocs/security-4.xml
tomcat/site/trunk/xdocs/security-5.xml
tomcat/site/trunk/xdocs/security-6.xml
tomcat/site/trunk/xdocs/security-7.xml
tomcat/site/trunk/xdocs/stylesheets/tomcat-site.xsl
Modified: tomcat/site/trunk/docs/bugreport.html
URL:
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/bugreport.html?rev=1661805&r1=1661804&r2=1661805&view=diff
==============================================================================
--- tomcat/site/trunk/docs/bugreport.html (original)
+++ tomcat/site/trunk/docs/bugreport.html Mon Feb 23 22:34:57 2015
@@ -425,9 +425,9 @@ problem you are having before reporting
</ul>
<p>The search page is
- <a href="https://issues.apache.org/bugzilla/query.cgi">here</a>.
+ <a href="https://bz.apache.org/bugzilla/query.cgi">here</a>.
There is also
- <a
href="https://issues.apache.org/bugzilla/query.cgi?format=advanced">advanced</a>
+ <a
href="https://bz.apache.org/bugzilla/query.cgi?format=advanced">advanced</a>
search page.
</p>
@@ -720,7 +720,7 @@ problem you are having before reporting
<p>Tomcat
<a href="http://tomcat.apache.org/maven-plugin.html">Maven plugin</a>
subproject tracks its issues in
- <a href="https://issues.apache.org/jira/browse/MTOMCAT">JIRA
database</a>.
+ <a href="https://bz.apache.org/jira/browse/MTOMCAT">JIRA database</a>.
</p>
</li>
@@ -751,12 +751,12 @@ bug in your web application.</p>
<p>Please provide as much information as possible. It is
very hard to fix a bug if the person looking into the problem cannot
reproduce it. See also
- <a
href="https://issues.apache.org/bugzilla/page.cgi?id=bug-writing.html">Bug
Writing Guidelines</a>.
+ <a href="https://bz.apache.org/bugzilla/page.cgi?id=bug-writing.html">Bug
Writing Guidelines</a>.
</p>
<p>Bug submission starts
- <a href="https://issues.apache.org/bugzilla/enter_bug.cgi">here</a>.
+ <a href="https://bz.apache.org/bugzilla/enter_bug.cgi">here</a>.
You have to include the following information in your bug report:</p>
<ul>
Modified: tomcat/site/trunk/docs/download-native.html
URL:
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/download-native.html?rev=1661805&r1=1661804&r2=1661805&view=diff
==============================================================================
--- tomcat/site/trunk/docs/download-native.html (original)
+++ tomcat/site/trunk/docs/download-native.html Mon Feb 23 22:34:57 2015
@@ -319,7 +319,7 @@
version of library is included in Apache Tomcat distributions.
b) OCSP-enabled. This one has enabled (experimental)
support for verification of client SSL certificates via OCSP
- protocol (<a
href="https://issues.apache.org/bugzilla/show_bug.cgi?id=45392">45392</a>).
+ protocol (<a
href="https://bz.apache.org/bugzilla/show_bug.cgi?id=45392">45392</a>).
</p>
<p>Each archive contains <code>tcnative-1.dll</code> for 32-bit,
Modified: tomcat/site/trunk/docs/getinvolved.html
URL:
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/getinvolved.html?rev=1661805&r1=1661804&r2=1661805&view=diff
==============================================================================
--- tomcat/site/trunk/docs/getinvolved.html (original)
+++ tomcat/site/trunk/docs/getinvolved.html Mon Feb 23 22:34:57 2015
@@ -213,7 +213,7 @@ few areas ways in which you can help:</p
Apache Tomcat user documentation.</li>
<li>
-<a href="https://issues.apache.org/bugzilla/">Investigate bugs</a> that have
+<a href="https://bz.apache.org/bugzilla/">Investigate bugs</a> that have
been reported and provide patches where appropriate.</li>
<li>Help with development for the next release of the Servlet and JSP
Modified: tomcat/site/trunk/docs/index.html
URL:
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/index.html?rev=1661805&r1=1661804&r2=1661805&view=diff
==============================================================================
--- tomcat/site/trunk/docs/index.html (original)
+++ tomcat/site/trunk/docs/index.html Mon Feb 23 22:34:57 2015
@@ -268,7 +268,7 @@ notable changes since 8.0.17 include:</p
<ul>
<li>A regression that caused response truncation when using forwarding
- (<a
href="https://issues.apache.org/bugzilla/show_bug.cgi?id=57475">57475</a>) has
been fixed.</li>
+ (<a
href="https://bz.apache.org/bugzilla/show_bug.cgi?id=57475">57475</a>) has been
fixed.</li>
<li>Various improvements to ReplicatedMap in Tribes.</li>
Modified: tomcat/site/trunk/docs/maven-plugin.html
URL:
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/maven-plugin.html?rev=1661805&r1=1661804&r2=1661805&view=diff
==============================================================================
--- tomcat/site/trunk/docs/maven-plugin.html (original)
+++ tomcat/site/trunk/docs/maven-plugin.html Mon Feb 23 22:34:57 2015
@@ -245,7 +245,7 @@
<p>
The Bug Tracker to use is the ASF Jira instance:
- <a
href="https://issues.apache.org/jira/browse/MTOMCAT">https://issues.apache.org/jira/browse/MTOMCAT</a>
+ <a
href="https://bz.apache.org/jira/browse/MTOMCAT">https://bz.apache.org/jira/browse/MTOMCAT</a>
</p>
Modified: tomcat/site/trunk/docs/migration-7.html
URL:
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/migration-7.html?rev=1661805&r1=1661804&r2=1661805&view=diff
==============================================================================
--- tomcat/site/trunk/docs/migration-7.html (original)
+++ tomcat/site/trunk/docs/migration-7.html Mon Feb 23 22:34:57 2015
@@ -409,7 +409,7 @@ of Apache Tomcat.</p>
regardless of the value of the <code>Host</code>'s <code>unpackWARs</code>
setting in versions 7.0.12 to 7.0.47 inclusive. Note that this unpacking is
only supported in 7.0.48 onwards. See issue
- <a
href="https://issues.apache.org/bugzilla/show_bug.cgi?id=51294#c1">51294</a>.
+ <a
href="https://bz.apache.org/bugzilla/show_bug.cgi?id=51294#c1">51294</a>.
</p>
</div>
@@ -790,9 +790,9 @@ of Apache Tomcat.</p>
difference is that Filters defined in the global <code>conf/web.xml</code>
now follow the ones defined in a web application, instead of preceding
them. See issues
- <a
href="https://issues.apache.org/bugzilla/show_bug.cgi?id=51754#c1">51754</a>
+ <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=51754#c1">51754</a>
and
- <a
href="https://issues.apache.org/bugzilla/show_bug.cgi?id=52138#c4">52138</a>
+ <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=52138#c4">52138</a>
for clarifications.</p>
@@ -828,7 +828,7 @@ of Apache Tomcat.</p>
Note, that upon clarification from the Servlet EG, even applications
using Servlet 2.4 and older versions of specification are being scanned.
See issue
- <a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=53619">53619</a>
+ <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=53619">53619</a>
and related discussions on the users mailing list.
</p>
Modified: tomcat/site/trunk/docs/oldnews-2013.html
URL:
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/oldnews-2013.html?rev=1661805&r1=1661804&r2=1661805&view=diff
==============================================================================
--- tomcat/site/trunk/docs/oldnews-2013.html (original)
+++ tomcat/site/trunk/docs/oldnews-2013.html Mon Feb 23 22:34:57 2015
@@ -585,7 +585,7 @@ and improvements compared to version 7.0
<ul>
-<li>A fix for CVE-2013-2071 (bug <a
href="https://issues.apache.org/bugzilla/show_bug.cgi?id=54178">54178</a>) an
information disclosure
+<li>A fix for CVE-2013-2071 (bug <a
href="https://bz.apache.org/bugzilla/show_bug.cgi?id=54178">54178</a>) an
information disclosure
issue.</li>
<li>Various fixes to stop Tomcat attempting to parse text that looks like an EL
@@ -740,7 +740,7 @@ improvements compared to version 7.0.35.
<li>Fix the regression in the JspC tool that is used to pre-compile JSP pages
introduced in 7.0.35. See
- <a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=54440">issue
+ <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=54440">issue
54440</a> for details. Patch provided by Sheldon Shao.</li>
<li>Improve handling of <code>ciphers</code> and
@@ -802,7 +802,7 @@ Full details of these changes, and all t
<p>
<strong>Notice:</strong> The JspC tool that is used to pre-compile JSP pages
is broken in this release. See
-<a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=54440">issue
54440</a>
+<a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=54440">issue 54440</a>
for details.
</p>
Modified: tomcat/site/trunk/docs/oldnews-2014.html
URL:
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/oldnews-2014.html?rev=1661805&r1=1661804&r2=1661805&view=diff
==============================================================================
--- tomcat/site/trunk/docs/oldnews-2014.html (original)
+++ tomcat/site/trunk/docs/oldnews-2014.html Mon Feb 23 22:34:57 2015
@@ -407,7 +407,7 @@ http://tomcat.apache.org/tomcat-8.0-doc/
<p>
NOTE: A regression has been reported in 8.0.11 (
-<a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=56882">bug
+<a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=56882">bug
56882</a>). A 8.0.12 release is expected in the next week or so to address
this.
</p>
@@ -475,9 +475,9 @@ Tomcat Native. The notable changes since
<li>Windows binaries are linked with OpenSSL 1.0.1h. This provides a fix
for <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224"
rel="nofollow">CVE-2014-0224</a>, an OpenSSL MITM vulnerability.
- (<a
href="https://issues.apache.org/bugzilla/show_bug.cgi?id=56596">56596</a>)</li>
+ (<a
href="https://bz.apache.org/bugzilla/show_bug.cgi?id=56596">56596</a>)</li>
-<li>Resolve an issue when using FIPS mode. (<a
href="https://issues.apache.org/bugzilla/show_bug.cgi?id=56396">56396</a>)</li>
+<li>Resolve an issue when using FIPS mode. (<a
href="https://bz.apache.org/bugzilla/show_bug.cgi?id=56396">56396</a>)</li>
</ul>
@@ -696,7 +696,7 @@ Tomcat Native. The notable changes since
(<a
href="https://wiki.apache.org/tomcat/Security/Heartbleed">Heartbleed</a>)
SSL vulnerability.</li>
-<li>Add support for ECDHE ciphers. (<a
href="https://issues.apache.org/bugzilla/show_bug.cgi?id=55915">55915</a>)</li>
+<li>Add support for ECDHE ciphers. (<a
href="https://bz.apache.org/bugzilla/show_bug.cgi?id=55915">55915</a>)</li>
</ul>
Modified: tomcat/site/trunk/docs/oldnews.html
URL:
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/oldnews.html?rev=1661805&r1=1661804&r2=1661805&view=diff
==============================================================================
--- tomcat/site/trunk/docs/oldnews.html (original)
+++ tomcat/site/trunk/docs/oldnews.html Mon Feb 23 22:34:57 2015
@@ -246,7 +246,7 @@ notable changes since 8.0.15 include:</p
<p>
<strong>Warning:</strong> The following notable bug was found in 8.0.17:
-<a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=57476">57476</a>:
some HTTP responses may be truncated. The team works
+<a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=57476">57476</a>: some
HTTP responses may be truncated. The team works
on preparing the next release (8.0.18) to address this issue.
</p>
Modified: tomcat/site/trunk/docs/security-4.html
URL:
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-4.html?rev=1661805&r1=1661804&r2=1661805&view=diff
==============================================================================
--- tomcat/site/trunk/docs/security-4.html (original)
+++ tomcat/site/trunk/docs/security-4.html Mon Feb 23 22:34:57 2015
@@ -387,7 +387,7 @@
</p>
-<p>Bugs <a
href="https://issues.apache.org/bugzilla/show_bug.cgi?id=29936">29936</a> and
<a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=45933">45933</a>
+<p>Bugs <a
href="https://bz.apache.org/bugzilla/show_bug.cgi?id=29936">29936</a> and <a
href="https://bz.apache.org/bugzilla/show_bug.cgi?id=45933">45933</a>
allowed a web application to replace the XML parser used by
Tomcat to process web.xml and tld files. In limited circumstances these
bugs may allow a rogue web application to view and/or alter the web.xml
@@ -718,7 +718,7 @@
<p>
-<a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=40771">Bug
+<a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=40771">Bug
40771</a> may result in the disclosure of POSTed content from a previous
request. For a vulnerability to exist, the content read from the input
stream must be disclosed, eg via writing it to the response and committing
@@ -740,7 +740,7 @@
<p>
-<a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=25835">
+<a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=25835">
Bug 25835</a> can, in rare circumstances - this has only been reproduced
using a debugger to force a particular processing sequence for two threads
-
allow a user from a non-permitted IP address to gain access to a context
Modified: tomcat/site/trunk/docs/security-5.html
URL:
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-5.html?rev=1661805&r1=1661804&r2=1661805&view=diff
==============================================================================
--- tomcat/site/trunk/docs/security-5.html (original)
+++ tomcat/site/trunk/docs/security-5.html Mon Feb 23 22:34:57 2015
@@ -967,7 +967,7 @@
</p>
-<p>Bugs <a
href="https://issues.apache.org/bugzilla/show_bug.cgi?id=29936">29936</a> and
<a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=45933">45933</a>
allowed a web application
+<p>Bugs <a
href="https://bz.apache.org/bugzilla/show_bug.cgi?id=29936">29936</a> and <a
href="https://bz.apache.org/bugzilla/show_bug.cgi?id=45933">45933</a> allowed a
web application
to replace the XML parser used by
Tomcat to process web.xml, context.xml and tld files. In limited
circumstances these bugs may allow a rogue web application to view
and/or
@@ -1356,7 +1356,7 @@
<p>
-<a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=40771">Bug
+<a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=40771">Bug
40771</a> may result in the disclosure of POSTed content from a previous
request. For a vulnerability to exist, the content read from the input
stream must be disclosed, eg via writing it to the response and committing
@@ -1487,7 +1487,7 @@
<p>
-<a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=25835">
+<a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=25835">
Bug 25835</a> can, in rare circumstances - this has only been reproduced
using a debugger to force a particular processing sequence for two threads
-
allow a user from a non-permitted IP address to gain access to a context
Modified: tomcat/site/trunk/docs/security-6.html
URL:
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-6.html?rev=1661805&r1=1661804&r2=1661805&view=diff
==============================================================================
--- tomcat/site/trunk/docs/security-6.html (original)
+++ tomcat/site/trunk/docs/security-6.html Mon Feb 23 22:34:57 2015
@@ -788,7 +788,7 @@
<p>When using the NIO connector with sendfile and HTTPS enabled, if a client
breaks the connection while reading the response an infinite loop is
entered leading to a denial of service. This was originally reported as
- <a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=52858">bug
+ <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=52858">bug
52858</a>.
</p>
@@ -1527,7 +1527,7 @@
</p>
-<p>Bugs <a
href="https://issues.apache.org/bugzilla/show_bug.cgi?id=29936">29936</a> and
<a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=45933">45933</a>
allowed a web application
+<p>Bugs <a
href="https://bz.apache.org/bugzilla/show_bug.cgi?id=29936">29936</a> and <a
href="https://bz.apache.org/bugzilla/show_bug.cgi?id=45933">45933</a> allowed a
web application
to replace the XML parser used by
Tomcat to process web.xml, context.xml and tld files. In limited
circumstances these bugs may allow a rogue web application to view
and/or
@@ -1945,7 +1945,7 @@
there is no magic solution. This issue has been discussed several times
on the Tomcat mailing lists. The best place to start to review these
discussions is the report for
- <a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=54263">bug
+ <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=54263">bug
54236</a>.</p>
Modified: tomcat/site/trunk/docs/security-7.html
URL:
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-7.html?rev=1661805&r1=1661804&r2=1661805&view=diff
==============================================================================
--- tomcat/site/trunk/docs/security-7.html (original)
+++ tomcat/site/trunk/docs/security-7.html Mon Feb 23 22:34:57 2015
@@ -642,7 +642,7 @@
</p>
-<p>Bug <a
href="https://issues.apache.org/bugzilla/show_bug.cgi?id=54178">54178</a>
described a scenario where elements of a previous
+<p>Bug <a
href="https://bz.apache.org/bugzilla/show_bug.cgi?id=54178">54178</a> described
a scenario where elements of a previous
request may be exposed to a current request. This was very difficult to
exploit deliberately but fairly likely to happen unexpectedly if an
application used AsyncListeners that threw RuntimeExceptions.</p>
@@ -920,7 +920,7 @@
<p>When using the NIO connector with sendfile and HTTPS enabled, if a client
breaks the connection while reading the response an infinite loop is
entered leading to a denial of service. This was originally reported as
- <a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=52858">bug
+ <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=52858">bug
52858</a>.
</p>
@@ -1268,7 +1268,7 @@
<p>The re-factoring of XML validation for Tomcat 7.0.x re-introduced the
vulnerability previously reported as <a
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0783"
rel="nofollow">CVE-2009-0783</a>.
This was initially
- <a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=51395">
+ <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=51395">
reported</a> as a memory leak. If a web application is the first web
application loaded, this bugs allows that web application to potentially
view and/or alter the web.xml, context.xml and tld files of other web
@@ -1646,7 +1646,7 @@
there is no magic solution. This issue has been discussed several times
on the Tomcat mailing lists. The best place to start to review these
discussions is the report for
- <a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=54263">bug
+ <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=54263">bug
54236</a>.</p>
Modified: tomcat/site/trunk/xdocs/bugreport.xml
URL:
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/bugreport.xml?rev=1661805&r1=1661804&r2=1661805&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/bugreport.xml (original)
+++ tomcat/site/trunk/xdocs/bugreport.xml Mon Feb 23 22:34:57 2015
@@ -121,9 +121,9 @@ problem you are having before reporting
information to help reproduce and resolve the bug.</li>
</ul>
<p>The search page is
- <a href="https://issues.apache.org/bugzilla/query.cgi">here</a>.
+ <a href="https://bz.apache.org/bugzilla/query.cgi">here</a>.
There is also
- <a
href="https://issues.apache.org/bugzilla/query.cgi?format=advanced">advanced</a>
+ <a
href="https://bz.apache.org/bugzilla/query.cgi?format=advanced">advanced</a>
search page.
</p>
<p>Here are some search tips.</p>
@@ -312,7 +312,7 @@ problem you are having before reporting
<li><p>Tomcat
<a href="http://tomcat.apache.org/maven-plugin.html">Maven plugin</a>
subproject tracks its issues in
- <a href="https://issues.apache.org/jira/browse/MTOMCAT">JIRA
database</a>.
+ <a href="https://bz.apache.org/jira/browse/MTOMCAT">JIRA database</a>.
</p>
</li>
@@ -336,11 +336,11 @@ bug in your web application.</p>
<p>Please provide as much information as possible. It is
very hard to fix a bug if the person looking into the problem cannot
reproduce it. See also
- <a
href="https://issues.apache.org/bugzilla/page.cgi?id=bug-writing.html">Bug
Writing Guidelines</a>.
+ <a href="https://bz.apache.org/bugzilla/page.cgi?id=bug-writing.html">Bug
Writing Guidelines</a>.
</p>
<p>Bug submission starts
- <a href="https://issues.apache.org/bugzilla/enter_bug.cgi">here</a>.
+ <a href="https://bz.apache.org/bugzilla/enter_bug.cgi">here</a>.
You have to include the following information in your bug report:</p>
<ul>
<li><p><b>Product</b>. Here is a list of supported products:</p>
Modified: tomcat/site/trunk/xdocs/getinvolved.xml
URL:
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/getinvolved.xml?rev=1661805&r1=1661804&r2=1661805&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/getinvolved.xml (original)
+++ tomcat/site/trunk/xdocs/getinvolved.xml Mon Feb 23 22:34:57 2015
@@ -21,7 +21,7 @@ few areas ways in which you can help:</p
<a href="http://wiki.apache.org/tomcat/FrontPage">Wiki</a>.</li>
<li>Contribute other documentation patches, either for the website or for the
Apache Tomcat user documentation.</li>
- <li><a href="https://issues.apache.org/bugzilla/">Investigate bugs</a> that
have
+ <li><a href="https://bz.apache.org/bugzilla/">Investigate bugs</a> that have
been reported and provide patches where appropriate.</li>
<li>Help with development for the next release of the Servlet and JSP
specifications.</li>
Modified: tomcat/site/trunk/xdocs/maven-plugin.xml
URL:
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/maven-plugin.xml?rev=1661805&r1=1661804&r2=1661805&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/maven-plugin.xml (original)
+++ tomcat/site/trunk/xdocs/maven-plugin.xml Mon Feb 23 22:34:57 2015
@@ -36,7 +36,7 @@
<subsection name="Bug Tracker">
<p>
The Bug Tracker to use is the ASF Jira instance:
- <a
href="https://issues.apache.org/jira/browse/MTOMCAT">https://issues.apache.org/jira/browse/MTOMCAT</a>
+ <a
href="https://bz.apache.org/jira/browse/MTOMCAT">https://bz.apache.org/jira/browse/MTOMCAT</a>
</p>
</subsection>
Modified: tomcat/site/trunk/xdocs/migration-7.xml
URL:
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/migration-7.xml?rev=1661805&r1=1661804&r2=1661805&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/migration-7.xml (original)
+++ tomcat/site/trunk/xdocs/migration-7.xml Mon Feb 23 22:34:57 2015
@@ -100,7 +100,7 @@ of Apache Tomcat.</p>
regardless of the value of the <code>Host</code>'s <code>unpackWARs</code>
setting in versions 7.0.12 to 7.0.47 inclusive. Note that this unpacking is
only supported in 7.0.48 onwards. See issue
- <a
href="https://issues.apache.org/bugzilla/show_bug.cgi?id=51294#c1">51294</a>.
+ <a
href="https://bz.apache.org/bugzilla/show_bug.cgi?id=51294#c1">51294</a>.
</p>
</subsection>
@@ -349,9 +349,9 @@ of Apache Tomcat.</p>
difference is that Filters defined in the global <code>conf/web.xml</code>
now follow the ones defined in a web application, instead of preceding
them. See issues
- <a
href="https://issues.apache.org/bugzilla/show_bug.cgi?id=51754#c1">51754</a>
+ <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=51754#c1">51754</a>
and
- <a
href="https://issues.apache.org/bugzilla/show_bug.cgi?id=52138#c4">52138</a>
+ <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=52138#c4">52138</a>
for clarifications.</p>
</subsection>
@@ -375,7 +375,7 @@ of Apache Tomcat.</p>
Note, that upon clarification from the Servlet EG, even applications
using Servlet 2.4 and older versions of specification are being scanned.
See issue
- <a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=53619">53619</a>
+ <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=53619">53619</a>
and related discussions on the users mailing list.
</p>
Modified: tomcat/site/trunk/xdocs/oldnews-2013.xml
URL:
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/oldnews-2013.xml?rev=1661805&r1=1661804&r2=1661805&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/oldnews-2013.xml (original)
+++ tomcat/site/trunk/xdocs/oldnews-2013.xml Mon Feb 23 22:34:57 2015
@@ -396,7 +396,7 @@ improvements compared to version 7.0.35.
<ul>
<li>Fix the regression in the JspC tool that is used to pre-compile JSP pages
introduced in 7.0.35. See
- <a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=54440">issue
+ <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=54440">issue
54440</a> for details. Patch provided by Sheldon Shao.</li>
<li>Improve handling of <code>ciphers</code> and
<code>sslEnabledProtocols</code> options for the BIO and NIO connectors.
The
@@ -442,7 +442,7 @@ Full details of these changes, and all t
<p><strong>Notice:</strong> The JspC tool that is used to pre-compile JSP pages
is broken in this release. See
-<a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=54440">issue
54440</a>
+<a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=54440">issue 54440</a>
for details.
</p>
Modified: tomcat/site/trunk/xdocs/oldnews-2014.xml
URL:
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/oldnews-2014.xml?rev=1661805&r1=1661804&r2=1661805&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/oldnews-2014.xml (original)
+++ tomcat/site/trunk/xdocs/oldnews-2014.xml Mon Feb 23 22:34:57 2015
@@ -153,7 +153,7 @@ http://tomcat.apache.org/tomcat-8.0-doc/
</p>
<p>
NOTE: A regression has been reported in 8.0.11 (
-<a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=56882">bug
+<a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=56882">bug
56882</a>). A 8.0.12 release is expected in the next week or so to address
this.
</p>
<p>
Modified: tomcat/site/trunk/xdocs/security-4.xml
URL:
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-4.xml?rev=1661805&r1=1661804&r2=1661805&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/security-4.xml (original)
+++ tomcat/site/trunk/xdocs/security-4.xml Mon Feb 23 22:34:57 2015
@@ -339,7 +339,7 @@
<p><strong>Low: Information disclosure</strong>
<cve>CVE-2008-4308</cve></p>
- <p><a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=40771">Bug
+ <p><a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=40771">Bug
40771</a> may result in the disclosure of POSTed content from a previous
request. For a vulnerability to exist, the content read from the input
stream must be disclosed, eg via writing it to the response and committing
@@ -354,7 +354,7 @@
<p><strong>Low: Information disclosure</strong>
<cve>CVE-2008-3271</cve></p>
- <p><a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=25835">
+ <p><a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=25835">
Bug 25835</a> can, in rare circumstances - this has only been reproduced
using a debugger to force a particular processing sequence for two threads
-
allow a user from a non-permitted IP address to gain access to a context
Modified: tomcat/site/trunk/xdocs/security-5.xml
URL:
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-5.xml?rev=1661805&r1=1661804&r2=1661805&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/security-5.xml (original)
+++ tomcat/site/trunk/xdocs/security-5.xml Mon Feb 23 22:34:57 2015
@@ -777,7 +777,7 @@
<p><strong>Low: Information disclosure</strong>
<cve>CVE-2008-4308</cve></p>
- <p><a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=40771">Bug
+ <p><a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=40771">Bug
40771</a> may result in the disclosure of POSTed content from a previous
request. For a vulnerability to exist, the content read from the input
stream must be disclosed, eg via writing it to the response and committing
@@ -866,7 +866,7 @@
<p><strong>Low: Information disclosure</strong>
<cve>CVE-2008-3271</cve></p>
- <p><a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=25835">
+ <p><a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=25835">
Bug 25835</a> can, in rare circumstances - this has only been reproduced
using a debugger to force a particular processing sequence for two threads
-
allow a user from a non-permitted IP address to gain access to a context
Modified: tomcat/site/trunk/xdocs/security-6.xml
URL:
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-6.xml?rev=1661805&r1=1661804&r2=1661805&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/security-6.xml (original)
+++ tomcat/site/trunk/xdocs/security-6.xml Mon Feb 23 22:34:57 2015
@@ -379,7 +379,7 @@
<p>When using the NIO connector with sendfile and HTTPS enabled, if a
client
breaks the connection while reading the response an infinite loop is
entered leading to a denial of service. This was originally reported as
- <a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=52858">bug
+ <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=52858">bug
52858</a>.
</p>
@@ -1179,7 +1179,7 @@
there is no magic solution. This issue has been discussed several times
on the Tomcat mailing lists. The best place to start to review these
discussions is the report for
- <a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=54263">bug
+ <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=54263">bug
54236</a>.</p>
<p>This was first discussed on the public Tomcat users mailing list on 19
Modified: tomcat/site/trunk/xdocs/security-7.xml
URL:
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-7.xml?rev=1661805&r1=1661804&r2=1661805&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/security-7.xml (original)
+++ tomcat/site/trunk/xdocs/security-7.xml Mon Feb 23 22:34:57 2015
@@ -463,7 +463,7 @@
<p>When using the NIO connector with sendfile and HTTPS enabled, if a
client
breaks the connection while reading the response an infinite loop is
entered leading to a denial of service. This was originally reported as
- <a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=52858">bug
+ <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=52858">bug
52858</a>.
</p>
@@ -704,7 +704,7 @@
<p>The re-factoring of XML validation for Tomcat 7.0.x re-introduced the
vulnerability previously reported as <cve>CVE-2009-0783</cve>.
This was initially
- <a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=51395">
+ <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=51395">
reported</a> as a memory leak. If a web application is the first web
application loaded, this bugs allows that web application to potentially
view and/or alter the web.xml, context.xml and tld files of other web
@@ -976,7 +976,7 @@
there is no magic solution. This issue has been discussed several times
on the Tomcat mailing lists. The best place to start to review these
discussions is the report for
- <a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=54263">bug
+ <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=54263">bug
54236</a>.</p>
<p>This was first discussed on the public Tomcat users mailing list on 19
Modified: tomcat/site/trunk/xdocs/stylesheets/tomcat-site.xsl
URL:
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/stylesheets/tomcat-site.xsl?rev=1661805&r1=1661804&r2=1661805&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/stylesheets/tomcat-site.xsl (original)
+++ tomcat/site/trunk/xdocs/stylesheets/tomcat-site.xsl Mon Feb 23 22:34:57 2015
@@ -34,7 +34,7 @@
<!-- Defined parameters (overrideable) -->
<xsl:param name="relative-path" select="'.'"/>
<xsl:param name="home-logo" select="'/images/tomcat.png'"/>
- <xsl:param name="buglink"
select="'https://issues.apache.org/bugzilla/show_bug.cgi?id='"/>
+ <xsl:param name="buglink"
select="'https://bz.apache.org/bugzilla/show_bug.cgi?id='"/>
<xsl:param name="revlink"
select="'http://svn.apache.org/viewvc?view=rev&rev='"/>
<xsl:param name="cvelink"
select="'http://cve.mitre.org/cgi-bin/cvename.cgi?name='"/>
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]