svn commit: r808462 - in /tomcat/site/trunk: docs/security-5.html xdocs/security-5.xml

2009-08-27 Thread markt
Author: markt
Date: Thu Aug 27 15:37:21 2009
New Revision: 808462

URL: http://svn.apache.org/viewvc?rev=808462&view=rev
Log:
Update for 5.5.28

Modified:
tomcat/site/trunk/docs/security-5.html
tomcat/site/trunk/xdocs/security-5.xml

Modified: tomcat/site/trunk/docs/security-5.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-5.html?rev=808462&r1=808461&r2=808462&view=diff
==
--- tomcat/site/trunk/docs/security-5.html (original)
+++ tomcat/site/trunk/docs/security-5.html Thu Aug 27 15:37:21 2009
@@ -3,18 +3,18 @@
 
 
 Apache Tomcat - Apache Tomcat 5.x vulnerabilities
-
-
-
+
+
+
 
-
-
+
+
 
 
 
 
 http://tomcat.apache.org/";>
-
+
 
 
 
@@ -25,28 +25,28 @@
 
 
 http://www.apache.org/";>
-http://www.apache.org/images/asf-logo.gif"; />
+http://www.apache.org/images/asf-logo.gif"; align="right" alt="Apache 
Logo" border="0"/>
 
 
 
 
 
-http://www.google.com/search";>
-
-
-
+http://www.google.com/search"; method="get">
+
+
+
 
 
-
+
 
 
 
-
+
 
 
 
 
-
+
 
 Apache Tomcat
 
@@ -175,11 +175,11 @@
 
 
 
-
-
+
+
 
 
-
+
 
 Apache Tomcat 5.x vulnerabilities
 
@@ -213,16 +213,16 @@
 
 
 
-
+
 
 
 
-
+
 
 
-
-
-Fixed in Apache Tomcat 5.5.SVN
+
+
+Fixed in Apache Tomcat 5.5.28
 
 
 
@@ -335,14 +335,14 @@
 
 
 
-
+
 
 
 
-
+
 
 
-
+
 
 Fixed in Apache Tomcat 5.5.27
 
@@ -415,14 +415,14 @@
 
 
 
-
+
 
 
 
-
+
 
 
-
+
 
 Fixed in Apache Tomcat 5.5.26
 
@@ -490,14 +490,14 @@
 
 
 
-
+
 
 
 
-
+
 
 
-
+
 
 Fixed in Apache Tomcat 5.5.25, 5.0.SVN
 
@@ -579,14 +579,14 @@
 
 
 
-
+
 
 
 
-
+
 
 
-
+
 
 Fixed in Apache Tomcat 5.5.24, 5.0.SVN
 
@@ -616,14 +616,14 @@
 
 
 
-
+
 
 
 
-
+
 
 
-
+
 
 Fixed in Apache Tomcat 5.5.23, 5.0.SVN
 
@@ -658,14 +658,14 @@
 
 
 
-
+
 
 
 
-
+
 
 
-
+
 
 Fixed in Apache Tomcat 5.5.22, 5.0.SVN
 
@@ -719,14 +719,14 @@
 
 
 
-
+
 
 
 
-
+
 
 
-
+
 
 Fixed in Apache Tomcat 5.5.21, 5.0.SVN
 
@@ -759,14 +759,14 @@
 
 
 
-
+
 
 
 
-
+
 
 
-
+
 
 Fixed in Apache Tomcat 5.5.21
 
@@ -811,14 +811,14 @@
 
 
 
-
+
 
 
 
-
+
 
 
-
+
 
 Fixed in Apache Tomcat 5.5.18, 5.0.SVN
 
@@ -846,14 +846,14 @@
 
 
 
-
+
 
 
 
-
+
 
 
-
+
 
 Fixed in Apache Tomcat 5.5.17, 5.0.SVN
 
@@ -881,14 +881,14 @@
 
 
 
-
+
 
 
 
-
+
 
 
-
+
 
 Fixed in Apache Tomcat 5.5.16, 5.0.SVN
 
@@ -916,14 +916,14 @@
 
 
 
-
+
 
 
 
-
+
 
 
-
+
 
 Fixed in Apache Tomcat 5.5.13, 5.0.SVN
 
@@ -971,14 +971,14 @@
 
 
 
-
+
 
 
 
-
+
 
 
-
+
 
 Fixed in Apache Tomcat 5.5.7, 5.0.SVN
 
@@ -1006,14 +1006,14 @@
 
 
 
-
+
 
 
 
-
+
 
 
-
+
 
 Fixed in Apache Tomcat 5.5.1
 
@@ -1045,14 +1045,14 @@
 
 
 
-
+
 
 
 
-
+
 
 
-
+
 
 Not a vulnerability in Tomcat
 
@@ -1118,7 +1118,7 @@
 
 
 
-
+
 
 
 
@@ -1127,17 +1127,17 @@
 
 
 
-
+
 
 
 
 
 
 
-
+
 
 Copyright © 1999-2009, The Apache Software Foundation
-
+
 "Apache", the Apache feather, and the Apache Tomcat logo are 
 trademarks of the Apache Software Foundation for our open source
 software.

Modified: tomcat/site/trunk/xdocs/security-5.xml
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-5.xml?rev=808462&r1=808461&r2=808462&view=diff
==
--- tomcat/site/trunk/xdocs/security-5.xml (original)
+++ tomcat/site/trunk/xdocs/security-5.xml Thu Aug 27 15:37:21 2009
@@ -28,7 +28,7 @@
 
   
 
-  
+  
 Important: Information Disclosure
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5515";>
CVE-2008-5515



-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



svn commit: r808465 - in /tomcat/site/trunk: docs/security-3.html docs/security-4.html xdocs/security-3.xml xdocs/security-4.xml

2009-08-27 Thread markt
Author: markt
Date: Thu Aug 27 15:40:42 2009
New Revision: 808465

URL: http://svn.apache.org/viewvc?rev=808465&view=rev
Log:
There will be no more security updates for 3.x and 4.x

Modified:
tomcat/site/trunk/docs/security-3.html
tomcat/site/trunk/docs/security-4.html
tomcat/site/trunk/xdocs/security-3.xml
tomcat/site/trunk/xdocs/security-4.xml

Modified: tomcat/site/trunk/docs/security-3.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-3.html?rev=808465&r1=808464&r2=808465&view=diff
==
--- tomcat/site/trunk/docs/security-3.html (original)
+++ tomcat/site/trunk/docs/security-3.html Thu Aug 27 15:40:42 2009
@@ -3,18 +3,18 @@
 
 
 Apache Tomcat - Apache Tomcat 3.x vulnerabilities
-
-
-
+
+
+
 
-
-
+
+
 
 
 
 
 http://tomcat.apache.org/";>
-
+
 
 
 
@@ -25,28 +25,28 @@
 
 
 http://www.apache.org/";>
-http://www.apache.org/images/asf-logo.gif"; />
+http://www.apache.org/images/asf-logo.gif"; align="right" alt="Apache 
Logo" border="0"/>
 
 
 
 
 
-http://www.google.com/search";>
-
-
-
+http://www.google.com/search"; method="get">
+
+
+
 
 
-
+
 
 
 
-
+
 
 
 
 
-
+
 
 Apache Tomcat
 
@@ -175,11 +175,11 @@
 
 
 
-
-
+
+
 
 
-
+
 
 Apache Tomcat 3.x vulnerabilities
 
@@ -201,20 +201,24 @@
 Please send comments or corrections for these vulnerabilities to the
mailto:secur...@tomcat.apache.org";>Tomcat Security 
Team.
 
+Please note that Tomcat 3 is no longer supported. Further 
vulnerabilities
+   in the 3.x branches will not be fixed. Users should upgrade to 5.5.x or
+   6.x to obtain security fixes.
+
   
 
 
 
 
 
-
+
 
 
 
-
+
 
 
-
+
 
 Not fixed in Apache Tomcat 3.x
 
@@ -282,14 +286,14 @@
 
 
 
-
+
 
 
 
-
+
 
 
-
+
 
 Fixed in Apache Tomcat 3.3.2
 
@@ -318,14 +322,14 @@
 
 
 
-
+
 
 
 
-
+
 
 
-
+
 
 Fixed in Apache Tomcat 3.3.1a
 
@@ -365,14 +369,14 @@
 
 
 
-
+
 
 
 
-
+
 
 
-
+
 
 Fixed in Apache Tomcat 3.3.1
 
@@ -401,14 +405,14 @@
 
 
 
-
+
 
 
 
-
+
 
 
-
+
 
 Fixed in Apache Tomcat 3.3a
 
@@ -450,14 +454,14 @@
 
 
 
-
+
 
 
 
-
+
 
 
-
+
 
 Fixed in Apache Tomcat 3.2.4
 
@@ -472,7 +476,7 @@
 moderate: Information disclosure
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-1563";>
CVE-2001-1563
-
+
 
 
 No specifics are provided in the vulnerability report. This may be a
@@ -485,14 +489,14 @@
 
 
 
-
+
 
 
 
-
+
 
 
-
+
 
 Fixed in Apache Tomcat 3.2.2
 
@@ -518,7 +522,7 @@
 moderate: Information disclosure
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0590";>
CVE-2001-0590
-
+
 
 
 A specially crafted URL can be used to obtain the source for JSPs.
@@ -530,14 +534,14 @@
 
 
 
-
+
 
 
 
-
+
 
 
-
+
 
 Fixed in Apache Tomcat 3.2
 
@@ -552,7 +556,7 @@
 low: Information disclosure
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0759";>
CVE-2000-0759
-
+
 
 
 Requesting a JSP that does not exist results in an error page that
@@ -564,7 +568,7 @@
 important: Information disclosure
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0672";>
CVE-2000-0672
-
+
 
 
 Access to the admin context is not protected. This context allows an
@@ -579,14 +583,14 @@
 
 
 
-
+
 
 
 
-
+
 
 
-
+
 
 Fixed in Apache Tomcat 3.1
 
@@ -601,7 +605,7 @@
 important: Information disclosure
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-1210";>
CVE-2000-1210
-
+
 
 
 source.jsp, provided as part of the examples, allows an attacker to read
@@ -614,7 +618,7 @@
 
 
 
-
+
 
 
 
@@ -623,17 +627,17 @@
 
 
 
-
+
 
 
 
 
 
 
-
+
 
 Copyright © 1999-2009, The Apache Software Foundation
-
+
 "Apache", the Apache feather, and the Apache Tomcat logo are 
 trademarks of the Apache Software Foundation for our open source
 software.

Modified: tomcat/site/trunk/docs/security-4.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-4.html?rev=808465&r1=808464&r2=808465&view=diff
==
--- tomcat/site/trunk/docs/security-4.html (original)
+++ tomcat/site/trunk/docs/security-4.html Thu Aug 27 15:40:42 2009
@@ -3,18 +3,18 @@
 
 
 Apache Tomcat - Apache Tomcat 4.x vulnerabilities
-
-
-
+
+
+
 
-
-
+
+
 
 
 
 
 http://tomcat.apache.org/";>
-
+
 
 
 
@@ -25,28 +25,28 @@
 
 
 http://www.apache.org/";>
-http://www.apache.org/images/asf-logo.gif"; />
+http://www.apache.org/images/asf-logo.gif"; align="right" alt="Apache 
Logo" border="0"/>
 
 
 
 
 
-http://www.google.com/search";>
-
-
-
+http://www.google.com/search"; method="get">
+
+
+
 
 
-
+
 
 
 
-
+
 
 
 
 
-
+
 
 Apache Tomcat
 
@@ -175,11 +175,11 @@
 
 
 
-
-
+
+
 
 
-
+
 
 Apache Tomcat 4.x vulnerabilities
 
@@ -201,9 +201,9 @@
 Please send comments or corrections for these vulnerabilities to the
mailto:secur...@tomcat.apache.org";>Tomcat Security 
Team.
 
-Please note that Tomcat

DO NOT REPLY [Bug 47750] New: Loss of worker settings when changing via jkstatus

2009-08-27 Thread bugzilla
https://issues.apache.org/bugzilla/show_bug.cgi?id=47750

   Summary: Loss of worker settings when changing via jkstatus
   Product: Tomcat Connectors
   Version: 1.2.28
  Platform: PC
OS/Version: Windows Server 2003
Status: NEW
  Severity: major
  Priority: P2
 Component: Common
AssignedTo: dev@tomcat.apache.org
ReportedBy: robert.ma...@capita.co.uk


--- Comment #0 from robert.ma...@capita.co.uk 2009-08-27 10:19:06 PDT ---
Running a load-balanced worker with two nodes - configuration is fine, as ISAPI
filter starts up and works correctly.

A change is made to a worker node using the jkstatus page (for example,
stopping node2, then starting it again).  This works fine, as the worker stops
correctly, then becomes available again and works fine.

After an amount of time, the mod_jk log shows the ISAPI filter starting again -
presumably this is IIS restarting something, although it doesn't behave the
same as an app pool recycle so not sure what it is or what is triggering it.
When this happens, the log shows the shared memory being reset in the log for
the workers, and what appears to be the shm being updated with the previous
values from the load-balancer worker's memory, although the sequence number
from memory doesn't match the value that was previously reached from performing
the updates via jkstatus:
jk_lb_worker.c (347): syncing shm for lb 'node-lb' from mem (0->1)

The log them shows shared memory for the load-balancer being synced again under
worker maintenance - the sequence numbers do not match, with the value of
p->sequence being the value previously reached from making the jkstatus
changes, while the shm sequence is still 1 as a result of the previous sync.
So the log shows:
jk_lb_worker.c (292): syncing mem for lb 'node-lb' from shm (3->1)

The log then shows that, as a result of this lb sync, the "changed" workers are
then sync'd from the shm.  However, as the data structure of the shm has been
reset by the "restart" of the ISAPI filter, the values for that worker are set
to zero.  As this includes the max_packet_size, any request to this worker will
be larger than the max packet size of zero and so causes an "error 413 request
entity too large" to be displayed.

The zero'd records display as such for the worker in jkstatus - manually
updating these entries to the correct values allows that worker to function
again.


I have made a small amendment on my system so that any calls to jk_lb_pull will
only occur if the mem sequeunce is less than the shm sequeunce (rather than
just "not equal"), ie.
changed:
if (p->sequence != p->s->h.sequence)
jk_lb_pull(p, JK_TRUE, l);
to:
if (p->sequence < p->s->h.sequence)
jk_lb_pull(p, JK_TRUE, l);
for all instances where jk_lb_pull is called as a result of this conditional.
It seems to have resolved this particular issue and the settings persist
correctly, but not sure if it is actually a correct solution!

-- 
Configure bugmail: https://issues.apache.org/bugzilla/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are the assignee for the bug.

-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



DO NOT REPLY [Bug 47750] Loss of worker settings when changing via jkstatus

2009-08-27 Thread bugzilla
https://issues.apache.org/bugzilla/show_bug.cgi?id=47750


robert.ma...@capita.co.uk changed:

   What|Removed |Added

 CC||robert.ma...@capita.co.uk


-- 
Configure bugmail: https://issues.apache.org/bugzilla/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are the assignee for the bug.

-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org



DO NOT REPLY [Bug 47756] New: Unable to read TLD "META-INF/taglib.tld"

2009-08-27 Thread bugzilla
https://issues.apache.org/bugzilla/show_bug.cgi?id=47756

   Summary: Unable to read TLD "META-INF/taglib.tld"
   Product: Tomcat 6
   Version: 6.0.20
  Platform: PC
OS/Version: Windows XP
Status: NEW
  Severity: normal
  Priority: P2
 Component: Jasper
AssignedTo: dev@tomcat.apache.org
ReportedBy: cn.myth.s...@gmail.com


--- Comment #0 from castalia  2009-08-27 23:10:22 PDT 
---
I got an error when using tomcat,the below are the details.And I
looked over the source of jaser and found [location[1] =
"META-INF/taglib.tld";] in the
org.apache.jasper.compiler.TagLibraryInfoImpl.java and
TagPluginManager.java.I want to know how to solve it and why??
Thanks.
---web.xml
  
  
   /struts-tags
   /WEB-INF/lib/struts2-core-2.1.6.jar
  
  
--
struts-tag.tld is in the struts2-core-2.1.6.jar.
-



Servlet.service() for servlet jsp threw exception
org.apache.jasper.JasperException: Unable to read TLD "META-INF/taglib.tld"
from JAR file
"file:/E:/workspace/.metadata/.plugins/org.eclipse.wst.server.core/tmp0/wtpwebapps/AccountMgr/WEB-INF/lib/struts2-core-2.1.6.jar":
java.lang.NullPointerException
 at
org.apache.jasper.compiler.DefaultErrorHandler.jspError(DefaultErrorHandler.java:51)
 at
org.apache.jasper.compiler.ErrorDispatcher.dispatch(ErrorDispatcher.java:409)
 at
org.apache.jasper.compiler.ErrorDispatcher.jspError(ErrorDispatcher.java:181)
 at
org.apache.jasper.compiler.TagLibraryInfoImpl.(TagLibraryInfoImpl.java:182)
 at org.apache.jasper.compiler.Parser.parseTaglibDirective(Parser.java:429)
 at org.apache.jasper.compiler.Parser.parseDirective(Parser.java:492)
 at org.apache.jasper.compiler.Parser.parseElements(Parser.java:1439)
 at org.apache.jasper.compiler.Parser.parse(Parser.java:137)
 at
org.apache.jasper.compiler.ParserController.doParse(ParserController.java:255)
 at
org.apache.jasper.compiler.ParserController.parse(ParserController.java:103)
 at org.apache.jasper.compiler.Compiler.generateJava(Compiler.java:170)
 at org.apache.jasper.compiler.Compiler.compile(Compiler.java:332)
 at org.apache.jasper.compiler.Compiler.compile(Compiler.java:312)
 at org.apache.jasper.compiler.Compiler.compile(Compiler.java:299)
 at
org.apache.jasper.JspCompilationContext.compile(JspCompilationContext.java:586)
 at
org.apache.jasper.servlet.JspServletWrapper.service(JspServletWrapper.java:317)
 at org.apache.jasper.servlet.JspServlet.serviceJspFile(JspServlet.java:342)
 at org.apache.jasper.servlet.JspServlet.service(JspServlet.java:267)
 at javax.servlet.http.HttpServlet.service(HttpServlet.java:717)
 at
org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:290)
 at
org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206)
 at
org.apache.struts2.dispatcher.FilterDispatcher.doFilter(FilterDispatcher.java:389)
 at
org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:235)
 at
org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:206)
 at
org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:233)
 at
org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:191)
 at
org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:128)
 at
org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:102)
 at
org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:109)
 at
org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:293)
 at
org.apache.coyote.http11.Http11Processor.process(Http11Processor.java:849)
 at
org.apache.coyote.http11.Http11Protocol$Http11ConnectionHandler.process(Http11Protocol.java:583)
 at org.apache.tomcat.util.net.JIoEndpoint$Worker.run(JIoEndpoint.java:454)
 at java.lang.Thread.run(Thread.java:620)

-- 
Configure bugmail: https://issues.apache.org/bugzilla/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are the assignee for the bug.

-
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org