Author: markt Date: Tue Oct 10 12:14:27 2023 New Revision: 1912868 URL: http://svn.apache.org/viewvc?rev=1912868&view=rev Log: Publish CVEs
Modified: tomcat/site/trunk/docs/security-10.html tomcat/site/trunk/docs/security-11.html tomcat/site/trunk/docs/security-8.html tomcat/site/trunk/docs/security-9.html tomcat/site/trunk/xdocs/security-10.xml tomcat/site/trunk/xdocs/security-11.xml tomcat/site/trunk/xdocs/security-8.xml tomcat/site/trunk/xdocs/security-9.xml Modified: tomcat/site/trunk/docs/security-10.html URL: http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-10.html?rev=1912868&r1=1912867&r2=1912868&view=diff ============================================================================== --- tomcat/site/trunk/docs/security-10.html (original) +++ tomcat/site/trunk/docs/security-10.html Tue Oct 10 12:14:27 2023 @@ -42,7 +42,56 @@ </p> </div><h3 id="Table_of_Contents">Table of Contents</h3><div class="text"> - <ul><li><a href="#Fixed_in_Apache_Tomcat_10.1.13">Fixed in Apache Tomcat 10.1.13</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.9">Fixed in Apache Tomcat 10.1.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.8">Fixed in Apache Tomcat 10.1.8</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.6">Fixed in Apache Tomcat 10.1.6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.5">Fixed in Apache Tomcat 10.1.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.2">Fixed in Apache Tomcat 10.1.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.1">Fixed in Apache Tomcat 10.1.1</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.27">Fixed in Apache Tomcat 10.0.27</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.23">Fixed in Apache Tomcat 10.0.23</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M17">Fixed in Apache Tomcat 10.1.0-M17</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.21">Fixed in Apache Tomcat 10.0.21</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M15">Fixed in Ap ache Tomcat 10.1.0-M15</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.20">Fixed in Apache Tomcat 10.0.20</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M14">Fixed in Apache Tomcat 10.1.0-M14</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.16">Fixed in Apache Tomcat 10.0.16</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M10">Fixed in Apache Tomcat 10.1.0-M10</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.12">Fixed in Apache Tomcat 10.0.12</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M6">Fixed in Apache Tomcat 10.1.0-M6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.7">Fixed in Apache Tomcat 10.0.7</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.6">Fixed in Apache Tomcat 10.0.6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.5">Fixed in Apache Tomcat 10.0.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.4">Fixed in Apache Tomcat 10.0.4</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.2">Fixed in Apache Tomcat 10.0.2</a></li><li><a href="#Fixed_in_Ap ache_Tomcat_10.0.0-M10">Fixed in Apache Tomcat 10.0.0-M10</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M8">Fixed in Apache Tomcat 10.0.0-M8</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M7">Fixed in Apache Tomcat 10.0.0-M7</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M6">Fixed in Apache Tomcat 10.0.0-M6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M5">Fixed in Apache Tomcat 10.0.0-M5</a></li><li><a href="#Not_a_vulnerability_in_Tomcat">Not a vulnerability in Tomcat</a></li></ul> + <ul><li><a href="#Fixed_in_Apache_Tomcat_10.0.14">Fixed in Apache Tomcat 10.0.14</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.13">Fixed in Apache Tomcat 10.1.13</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.9">Fixed in Apache Tomcat 10.1.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.8">Fixed in Apache Tomcat 10.1.8</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.6">Fixed in Apache Tomcat 10.1.6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.5">Fixed in Apache Tomcat 10.1.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.2">Fixed in Apache Tomcat 10.1.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.1">Fixed in Apache Tomcat 10.1.1</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.27">Fixed in Apache Tomcat 10.0.27</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.23">Fixed in Apache Tomcat 10.0.23</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M17">Fixed in Apache Tomcat 10.1.0-M17</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.21">Fixed in Apach e Tomcat 10.0.21</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M15">Fixed in Apache Tomcat 10.1.0-M15</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.20">Fixed in Apache Tomcat 10.0.20</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M14">Fixed in Apache Tomcat 10.1.0-M14</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.16">Fixed in Apache Tomcat 10.0.16</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M10">Fixed in Apache Tomcat 10.1.0-M10</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.12">Fixed in Apache Tomcat 10.0.12</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M6">Fixed in Apache Tomcat 10.1.0-M6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.7">Fixed in Apache Tomcat 10.0.7</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.6">Fixed in Apache Tomcat 10.0.6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.5">Fixed in Apache Tomcat 10.0.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.4">Fixed in Apache Tomcat 10.0.4</a></li><li><a href="#Fixed_in_ Apache_Tomcat_10.0.2">Fixed in Apache Tomcat 10.0.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M10">Fixed in Apache Tomcat 10.0.0-M10</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M8">Fixed in Apache Tomcat 10.0.0-M8</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M7">Fixed in Apache Tomcat 10.0.0-M7</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M6">Fixed in Apache Tomcat 10.0.0-M6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M5">Fixed in Apache Tomcat 10.0.0-M5</a></li><li><a href="#Not_a_vulnerability_in_Tomcat">Not a vulnerability in Tomcat</a></li></ul> + </div><h3 id="Fixed_in_Apache_Tomcat_10.0.14"><span class="pull-right">2023-10-10</span> Fixed in Apache Tomcat 10.0.14</h3><div class="text"> + + <p><strong>Important: Request smuggling</strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45648" rel="nofollow">CVE-2023-45648</a></p> + + <p>Tomcat did not correctly parse HTTP trailer headers. A specially crafted, + invalid trailer header could cause Tomcat to treat a single request as + multiple requests leading to the possibility of request smuggling when + behind a reverse proxy.</p> + + <p>This was fixed with commit + <a href="https://github.com/apache/tomcat/commit/8ecff306507be8e4fd3adee1ae5de1ea6661a8f4">8ecff306</a>.</p> + + <p>This issue was reported to the Tomcat Security Team on 12 September 2023. + The issue was made public on 10 October 2023.</p> + + <p>Affects: 10.1.0-M1 to 10.1.13</p> + + <p><strong>Important: Denial of Service</strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44487" rel="nofollow">CVE-2023-44487</a></p> + + <p>Tomcat's HTTP/2 implementation was vulnerable to the rapid reset + attack. The denial of service typically manifested as an + <code>OutOfMemoryError</code>.</p> + + <p>This was fixed with commit + <a href="https://github.com/apache/tomcat/commit/76bb4bfbfeae827dce896f650655bbf6e251ed49">76bb4bfb</a>.</p> + + <p>This issue was reported to the Tomcat Security Team on 14 September 2023. + The issue was made public on 10 October 2023.</p> + + <p>Affects: 10.1.0-M1 to 10.1.13</p> + + <p><strong>Important: Information Disclosure</strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42795" rel="nofollow">CVE-2023-42795</a></p> + + <p>When recycling various internal objects, including the request and the + response, prior to re-use by the next request/response, an error could + cause Tomcat to skip some parts of the recycling process leading to + information leaking from the current request/response to the next.</p> + + <p>This was fixed with commit + <a href="https://github.com/apache/tomcat/commit/9375d67106f8df9eb9d7b360b2bef052fe67d3d4">9375d671</a>.</p> + + <p>This issue was identified by the Tomcat Security Team on 13 September + 2023. The issue was made public on 10 October 2023.</p> + + <p>Affects: 10.1.0-M1 to 10.1.13</p> + </div><h3 id="Fixed_in_Apache_Tomcat_10.1.13"><span class="pull-right">2023-08-25</span> Fixed in Apache Tomcat 10.1.13</h3><div class="text"> <p><strong>Moderate: Open redirect</strong> Modified: tomcat/site/trunk/docs/security-11.html URL: http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-11.html?rev=1912868&r1=1912867&r2=1912868&view=diff ============================================================================== --- tomcat/site/trunk/docs/security-11.html (original) +++ tomcat/site/trunk/docs/security-11.html Tue Oct 10 12:14:27 2023 @@ -36,7 +36,56 @@ </p> </div><h3 id="Table_of_Contents">Table of Contents</h3><div class="text"> - <ul><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M11">Fixed in Apache Tomcat 11.0.0-M11</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M6">Fixed in Apache Tomcat 11.0.0-M6</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M5">Fixed in Apache Tomcat 11.0.0-M5</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M3">Fixed in Apache Tomcat 11.0.0-M3</a></li></ul> + <ul><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M12">Fixed in Apache Tomcat 11.0.0-M12</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M11">Fixed in Apache Tomcat 11.0.0-M11</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M6">Fixed in Apache Tomcat 11.0.0-M6</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M5">Fixed in Apache Tomcat 11.0.0-M5</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M3">Fixed in Apache Tomcat 11.0.0-M3</a></li></ul> + </div><h3 id="Fixed_in_Apache_Tomcat_11.0.0-M12"><span class="pull-right">2023-10-10</span> Fixed in Apache Tomcat 11.0.0-M12</h3><div class="text"> + + <p><strong>Important: Request smuggling</strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45648" rel="nofollow">CVE-2023-45648</a></p> + + <p>Tomcat did not correctly parse HTTP trailer headers. A specially crafted, + invalid trailer header could cause Tomcat to treat a single request as + multiple requests leading to the possibility of request smuggling when + behind a reverse proxy.</p> + + <p>This was fixed with commit + <a href="https://github.com/apache/tomcat/commit/eb5c094e5560764cda436362254997511a3ca1f6">eb5c094e</a>.</p> + + <p>This issue was reported to the Tomcat Security Team on 12 September 2023. + The issue was made public on 10 October 2023.</p> + + <p>Affects: 11.0.0-M1 to 11.0.0-M11</p> + + <p><strong>Important: Denial of Service</strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44487" rel="nofollow">CVE-2023-44487</a></p> + + <p>Tomcat's HTTP/2 implementation was vulnerable to the rapid reset + attack. The denial of service typically manifested as an + <code>OutOfMemoryError</code>.</p> + + <p>This was fixed with commit + <a href="https://github.com/apache/tomcat/commit/9cdfe25bad707f34b3e5da2994f3f1952a163c3e">9cdfe25b</a>.</p> + + <p>This issue was reported to the Tomcat Security Team on 14 September 2023. + The issue was made public on 10 October 2023.</p> + + <p>Affects: 11.0.0-M1 to 11.0.0-M11</p> + + <p><strong>Important: Information Disclosure</strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42795" rel="nofollow">CVE-2023-42795</a></p> + + <p>When recycling various internal objects, including the request and the + response, prior to re-use by the next request/response, an error could + cause Tomcat to skip some parts of the recycling process leading to + information leaking from the current request/response to the next.</p> + + <p>This was fixed with commit + <a href="https://github.com/apache/tomcat/commit/d6db22e411307c97ddf78315c15d5889356eca38">d6db22e4</a>.</p> + + <p>This issue was identified by the Tomcat Security Team on 13 September + 2023. The issue was made public on 10 October 2023.</p> + + <p>Affects: 11.0.0-M1 to 11.0.0-M11</p> + </div><h3 id="Fixed_in_Apache_Tomcat_11.0.0-M11"><span class="pull-right">2023-08-25</span> Fixed in Apache Tomcat 11.0.0-M11</h3><div class="text"> <p><strong>Moderate: Open redirect</strong> Modified: tomcat/site/trunk/docs/security-8.html URL: http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-8.html?rev=1912868&r1=1912867&r2=1912868&view=diff ============================================================================== --- tomcat/site/trunk/docs/security-8.html (original) +++ tomcat/site/trunk/docs/security-8.html Tue Oct 10 12:14:27 2023 @@ -42,7 +42,74 @@ </p> </div><h3 id="Table_of_Contents">Table of Contents</h3><div class="text"> - <ul><li><a href="#Fixed_in_Apache_Tomcat_8.5.93">Fixed in Apache Tomcat 8.5.93</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.89">Fixed in Apache Tomcat 8.5.89</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.88">Fixed in Apache Tomcat 8.5.88</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.86">Fixed in Apache Tomcat 8.5.86</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.85">Fixed in Apache Tomcat 8.5.85</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.84">Fixed in Apache Tomcat 8.5.84</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.83">Fixed in Apache Tomcat 8.5.83</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.82">Fixed in Apache Tomcat 8.5.82</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.79">Fixed in Apache Tomcat 8.5.79</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.78">Fixed in Apache Tomcat 8.5.78</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.76">Fixed in Apache Tomcat 8.5.76</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.75">Fixed in Apache Tomcat 8.5.75</ a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.72">Fixed in Apache Tomcat 8.5.72</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.68">Fixed in Apache Tomcat 8.5.68</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.66">Fixed in Apache Tomcat 8.5.66</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.65">Fixed in Apache Tomcat 8.5.65</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.64">Fixed in Apache Tomcat 8.5.64</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.63">Fixed in Apache Tomcat 8.5.63</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.60">Fixed in Apache Tomcat 8.5.60</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.58">Fixed in Apache Tomcat 8.5.58</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.57">Fixed in Apache Tomcat 8.5.57</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.56">Fixed in Apache Tomcat 8.5.56</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.55">Fixed in Apache Tomcat 8.5.55</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.51">Fixed in Apache Tomcat 8.5.51</a ></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.50">Fixed in Apache Tomcat >8.5.50</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.49">Fixed in Apache >Tomcat 8.5.49</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.41">Fixed in >Apache Tomcat 8.5.41</a></li><li><a >href="#Fixed_in_Apache_Tomcat_8.5.40">Fixed in Apache Tomcat >8.5.40</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.38">Fixed in Apache >Tomcat 8.5.38</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.34">Fixed in >Apache Tomcat 8.5.34</a></li><li><a >href="#Fixed_in_Apache_Tomcat_8.0.53">Fixed in Apache Tomcat >8.0.53</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.32">Fixed in Apache >Tomcat 8.5.32</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.52">Fixed in >Apache Tomcat 8.0.52</a></li><li><a >href="#Fixed_in_Apache_Tomcat_8.5.31">Fixed in Apache Tomcat >8.5.31</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.50">Fixed in Apache >Tomcat 8.0.50</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.28">Fixed in >Apache Tomcat 8.5.28</a> </li><li><a href="#Fixed_in_Apache_Tomcat_8.0.48">Fixed in Apache Tomcat 8.0.48</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.24">Fixed in Apache Tomcat 8.5.24</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.47">Fixed in Apache Tomcat 8.0.47</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.23">Fixed in Apache Tomcat 8.5.23</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.45">Fixed in Apache Tomcat 8.0.45</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.16">Fixed in Apache Tomcat 8.5.16</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.44">Fixed in Apache Tomcat 8.0.44</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.15">Fixed in Apache Tomcat 8.5.15</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.43">Fixed in Apache Tomcat 8.0.43</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.13">Fixed in Apache Tomcat 8.5.13</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.42">Fixed in Apache Tomcat 8.0.42</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.12">Fixed in Apache Tomcat 8.5.12</a>< /li><li><a href="#Fixed_in_Apache_Tomcat_8.0.41">Fixed in Apache Tomcat 8.0.41</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.11">Fixed in Apache Tomcat 8.5.11</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.9">Fixed in Apache Tomcat 8.5.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.39">Fixed in Apache Tomcat 8.0.39</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.8">Fixed in Apache Tomcat 8.5.8</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.5_and_8.0.37">Fixed in Apache Tomcat 8.5.5 and 8.0.37</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.3_and_8.0.36">Fixed in Apache Tomcat 8.5.3 and 8.0.36</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.32">Fixed in Apache Tomcat 8.0.32</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.30">Fixed in Apache Tomcat 8.0.30</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.27">Fixed in Apache Tomcat 8.0.27</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.17">Fixed in Apache Tomcat 8.0.17</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.9"> Fixed in Apache Tomcat 8.0.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.8">Fixed in Apache Tomcat 8.0.8</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.5">Fixed in Apache Tomcat 8.0.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.3">Fixed in Apache Tomcat 8.0.3</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.0-RC10">Fixed in Apache Tomcat 8.0.0-RC10</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.0-RC3">Fixed in Apache Tomcat 8.0.0-RC3</a></li><li><a href="#Not_a_vulnerability_in_Tomcat">Not a vulnerability in Tomcat</a></li><li><a href="#Not_a_vulnerability_in_Tomcat">Not a vulnerability in Tomcat</a></li></ul> + <ul><li><a href="#Fixed_in_Apache_Tomcat_8.5.94">Fixed in Apache Tomcat 8.5.94</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.93">Fixed in Apache Tomcat 8.5.93</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.89">Fixed in Apache Tomcat 8.5.89</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.88">Fixed in Apache Tomcat 8.5.88</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.86">Fixed in Apache Tomcat 8.5.86</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.85">Fixed in Apache Tomcat 8.5.85</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.84">Fixed in Apache Tomcat 8.5.84</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.83">Fixed in Apache Tomcat 8.5.83</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.82">Fixed in Apache Tomcat 8.5.82</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.79">Fixed in Apache Tomcat 8.5.79</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.78">Fixed in Apache Tomcat 8.5.78</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.76">Fixed in Apache Tomcat 8.5.76</ a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.75">Fixed in Apache Tomcat 8.5.75</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.72">Fixed in Apache Tomcat 8.5.72</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.68">Fixed in Apache Tomcat 8.5.68</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.66">Fixed in Apache Tomcat 8.5.66</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.65">Fixed in Apache Tomcat 8.5.65</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.64">Fixed in Apache Tomcat 8.5.64</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.63">Fixed in Apache Tomcat 8.5.63</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.60">Fixed in Apache Tomcat 8.5.60</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.58">Fixed in Apache Tomcat 8.5.58</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.57">Fixed in Apache Tomcat 8.5.57</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.56">Fixed in Apache Tomcat 8.5.56</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.55">Fixed in Apache Tomcat 8.5.55</a ></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.51">Fixed in Apache Tomcat >8.5.51</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.50">Fixed in Apache >Tomcat 8.5.50</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.49">Fixed in >Apache Tomcat 8.5.49</a></li><li><a >href="#Fixed_in_Apache_Tomcat_8.5.41">Fixed in Apache Tomcat >8.5.41</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.40">Fixed in Apache >Tomcat 8.5.40</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.38">Fixed in >Apache Tomcat 8.5.38</a></li><li><a >href="#Fixed_in_Apache_Tomcat_8.5.34">Fixed in Apache Tomcat >8.5.34</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.53">Fixed in Apache >Tomcat 8.0.53</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.32">Fixed in >Apache Tomcat 8.5.32</a></li><li><a >href="#Fixed_in_Apache_Tomcat_8.0.52">Fixed in Apache Tomcat >8.0.52</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.31">Fixed in Apache >Tomcat 8.5.31</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.50">Fixed in >Apache Tomcat 8.0.50</a> </li><li><a href="#Fixed_in_Apache_Tomcat_8.5.28">Fixed in Apache Tomcat 8.5.28</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.48">Fixed in Apache Tomcat 8.0.48</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.24">Fixed in Apache Tomcat 8.5.24</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.47">Fixed in Apache Tomcat 8.0.47</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.23">Fixed in Apache Tomcat 8.5.23</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.45">Fixed in Apache Tomcat 8.0.45</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.16">Fixed in Apache Tomcat 8.5.16</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.44">Fixed in Apache Tomcat 8.0.44</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.15">Fixed in Apache Tomcat 8.5.15</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.43">Fixed in Apache Tomcat 8.0.43</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.13">Fixed in Apache Tomcat 8.5.13</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.42">Fixed in Apache Tomcat 8.0.42</a>< /li><li><a href="#Fixed_in_Apache_Tomcat_8.5.12">Fixed in Apache Tomcat 8.5.12</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.41">Fixed in Apache Tomcat 8.0.41</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.11">Fixed in Apache Tomcat 8.5.11</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.9">Fixed in Apache Tomcat 8.5.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.39">Fixed in Apache Tomcat 8.0.39</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.8">Fixed in Apache Tomcat 8.5.8</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.5_and_8.0.37">Fixed in Apache Tomcat 8.5.5 and 8.0.37</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.3_and_8.0.36">Fixed in Apache Tomcat 8.5.3 and 8.0.36</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.32">Fixed in Apache Tomcat 8.0.32</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.30">Fixed in Apache Tomcat 8.0.30</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.27">Fixed in Apache Tomcat 8.0.27</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.17" >Fixed in Apache Tomcat 8.0.17</a></li><li><a >href="#Fixed_in_Apache_Tomcat_8.0.9">Fixed in Apache Tomcat >8.0.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.8">Fixed in Apache >Tomcat 8.0.8</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.5">Fixed in >Apache Tomcat 8.0.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.3">Fixed >in Apache Tomcat 8.0.3</a></li><li><a >href="#Fixed_in_Apache_Tomcat_8.0.0-RC10">Fixed in Apache Tomcat >8.0.0-RC10</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.0-RC3">Fixed in >Apache Tomcat 8.0.0-RC3</a></li><li><a >href="#Not_a_vulnerability_in_Tomcat">Not a vulnerability in >Tomcat</a></li><li><a href="#Not_a_vulnerability_in_Tomcat">Not a >vulnerability in Tomcat</a></li></ul> + </div><h3 id="Fixed_in_Apache_Tomcat_8.5.94"><span class="pull-right">2023-10-10</span> Fixed in Apache Tomcat 8.5.94</h3><div class="text"> + + <p><strong>Important: Request smuggling</strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45648" rel="nofollow">CVE-2023-45648</a></p> + + <p>Tomcat did not correctly parse HTTP trailer headers. A specially crafted, + invalid trailer header could cause Tomcat to treat a single request as + multiple requests leading to the possibility of request smuggling when + behind a reverse proxy.</p> + + <p>This was fixed with commit + <a href="https://github.com/apache/tomcat/commit/59583245639d8c42ae0009f4a4a70464d3ea70a0">59583245</a>.</p> + + <p>This issue was reported to the Tomcat Security Team on 12 September 2023. + The issue was made public on 10 October 2023.</p> + + <p>Affects: 8.5.0 to 8.5.93</p> + + <p><strong>Important: Denial of Service</strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44487" rel="nofollow">CVE-2023-44487</a></p> + + <p>Tomcat's HTTP/2 implementation was vulnerable to the rapid reset + attack. The denial of service typically manifested as an + <code>OutOfMemoryError</code>.</p> + + <p>This was fixed with commit + <a href="https://github.com/apache/tomcat/commit/944332bb15bd2f3bf76ec2caeb1ff0a58a3bc628">944332bb</a>.</p> + + <p>This issue was reported to the Tomcat Security Team on 14 September 2023. + The issue was made public on 10 October 2023.</p> + + <p>Affects: 8.5.0 to 8.5.93</p> + + <p><strong>Important: Information Disclosure</strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42795" rel="nofollow">CVE-2023-42795</a></p> + + <p>When recycling various internal objects, including the request and the + response, prior to re-use by the next request/response, an error could + cause Tomcat to skip some parts of the recycling process leading to + information leaking from the current request/response to the next.</p> + + <p>This was fixed with commit + <a href="https://github.com/apache/tomcat/commit/30f8063d7a9b4c43ae4722f5e382a76af1d7a6bf">30f8063d</a>.</p> + + <p>This issue was identified by the Tomcat Security Team on 13 September + 2023. The issue was made public on 10 October 2023.</p> + + <p>Affects: 8.5.0 to 8.5.93</p> + + <p><strong>Low: Denial of Service</strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42794" rel="nofollow">CVE-2023-42794</a></p> + + <p>Tomcat's internal fork of a Commons FileUpload included an unreleased, in + progress refactoring that exposed a potential denial of service on + Windows if a web application opened a stream for an uploaded file but + failed to close the stream. The file would never be deleted from disk + creating the possibility of an eventual denial of service due to the disk + being full.</p> + + <p>This was fixed with commit + <a href="https://github.com/apache/tomcat/commit/c99ffc30e95ddc4daede564d08cb5ea2b9a9da65">c99ffc30</a>.</p> + + <p>This issue was reported to the Tomcat Security Team on 1 September + 2023. The issue was made public on 10 October 2023.</p> + + <p>Affects: 8.5.85 to 8.5.93</p> + </div><h3 id="Fixed_in_Apache_Tomcat_8.5.93"><span class="pull-right">2023-08-25</span> Fixed in Apache Tomcat 8.5.93</h3><div class="text"> <p><strong>Moderate: Open redirect</strong> Modified: tomcat/site/trunk/docs/security-9.html URL: http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-9.html?rev=1912868&r1=1912867&r2=1912868&view=diff ============================================================================== --- tomcat/site/trunk/docs/security-9.html (original) +++ tomcat/site/trunk/docs/security-9.html Tue Oct 10 12:14:27 2023 @@ -36,7 +36,74 @@ </p> </div><h3 id="Table_of_Contents">Table of Contents</h3><div class="text"> - <ul><li><a href="#Fixed_in_Apache_Tomcat_9.0.80">Fixed in Apache Tomcat 9.0.80</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.75">Fixed in Apache Tomcat 9.0.75</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.74">Fixed in Apache Tomcat 9.0.74</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.72">Fixed in Apache Tomcat 9.0.72</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.71">Fixed in Apache Tomcat 9.0.71</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.69">Fixed in Apache Tomcat 9.0.69</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.68">Fixed in Apache Tomcat 9.0.68</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.65">Fixed in Apache Tomcat 9.0.65</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.63">Fixed in Apache Tomcat 9.0.63</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.62">Fixed in Apache Tomcat 9.0.62</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.58">Fixed in Apache Tomcat 9.0.58</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.54">Fixed in Apache Tomcat 9.0.54</ a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.48">Fixed in Apache Tomcat 9.0.48</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.46">Fixed in Apache Tomcat 9.0.46</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.45">Fixed in Apache Tomcat 9.0.45</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.44">Fixed in Apache Tomcat 9.0.44</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.43">Fixed in Apache Tomcat 9.0.43</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.40">Fixed in Apache Tomcat 9.0.40</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.38">Fixed in Apache Tomcat 9.0.38</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.37">Fixed in Apache Tomcat 9.0.37</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.36">Fixed in Apache Tomcat 9.0.36</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.35">Fixed in Apache Tomcat 9.0.35</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.31">Fixed in Apache Tomcat 9.0.31</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.30">Fixed in Apache Tomcat 9.0.30</a ></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.29">Fixed in Apache Tomcat >9.0.29</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.21">Fixed in Apache >Tomcat 9.0.21</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.20">Fixed in >Apache Tomcat 9.0.20</a></li><li><a >href="#Fixed_in_Apache_Tomcat_9.0.19">Fixed in Apache Tomcat >9.0.19</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.16">Fixed in Apache >Tomcat 9.0.16</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.12">Fixed in >Apache Tomcat 9.0.12</a></li><li><a >href="#Fixed_in_Apache_Tomcat_9.0.10">Fixed in Apache Tomcat >9.0.10</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.9">Fixed in Apache >Tomcat 9.0.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.8">Fixed in >Apache Tomcat 9.0.8</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.5">Fixed >in Apache Tomcat 9.0.5</a></li><li><a >href="#Fixed_in_Apache_Tomcat_9.0.2">Fixed in Apache Tomcat >9.0.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.1">Fixed in Apache >Tomcat 9.0.1</a></li><li>< a href="#Fixed_in_Apache_Tomcat_9.0.0.M22">Fixed in Apache Tomcat 9.0.0.M22</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M21">Fixed in Apache Tomcat 9.0.0.M21</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M19">Fixed in Apache Tomcat 9.0.0.M19</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M18">Fixed in Apache Tomcat 9.0.0.M18</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M17">Fixed in Apache Tomcat 9.0.0.M17</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M15">Fixed in Apache Tomcat 9.0.0.M15</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M13">Fixed in Apache Tomcat 9.0.0.M13</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M10">Fixed in Apache Tomcat 9.0.0.M10</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M8">Fixed in Apache Tomcat 9.0.0.M8</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M3">Fixed in Apache Tomcat 9.0.0.M3</a></li><li><a href="#Not_a_vulnerability_in_Tomcat">Not a vulnerability in Tomcat</a></li></ul> + <ul><li><a href="#Fixed_in_Apache_Tomcat_9.0.81">Fixed in Apache Tomcat 9.0.81</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.80">Fixed in Apache Tomcat 9.0.80</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.75">Fixed in Apache Tomcat 9.0.75</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.74">Fixed in Apache Tomcat 9.0.74</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.72">Fixed in Apache Tomcat 9.0.72</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.71">Fixed in Apache Tomcat 9.0.71</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.69">Fixed in Apache Tomcat 9.0.69</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.68">Fixed in Apache Tomcat 9.0.68</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.65">Fixed in Apache Tomcat 9.0.65</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.63">Fixed in Apache Tomcat 9.0.63</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.62">Fixed in Apache Tomcat 9.0.62</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.58">Fixed in Apache Tomcat 9.0.58</ a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.54">Fixed in Apache Tomcat 9.0.54</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.48">Fixed in Apache Tomcat 9.0.48</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.46">Fixed in Apache Tomcat 9.0.46</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.45">Fixed in Apache Tomcat 9.0.45</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.44">Fixed in Apache Tomcat 9.0.44</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.43">Fixed in Apache Tomcat 9.0.43</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.40">Fixed in Apache Tomcat 9.0.40</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.38">Fixed in Apache Tomcat 9.0.38</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.37">Fixed in Apache Tomcat 9.0.37</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.36">Fixed in Apache Tomcat 9.0.36</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.35">Fixed in Apache Tomcat 9.0.35</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.31">Fixed in Apache Tomcat 9.0.31</a ></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.30">Fixed in Apache Tomcat >9.0.30</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.29">Fixed in Apache >Tomcat 9.0.29</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.21">Fixed in >Apache Tomcat 9.0.21</a></li><li><a >href="#Fixed_in_Apache_Tomcat_9.0.20">Fixed in Apache Tomcat >9.0.20</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.19">Fixed in Apache >Tomcat 9.0.19</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.16">Fixed in >Apache Tomcat 9.0.16</a></li><li><a >href="#Fixed_in_Apache_Tomcat_9.0.12">Fixed in Apache Tomcat >9.0.12</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.10">Fixed in Apache >Tomcat 9.0.10</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.9">Fixed in >Apache Tomcat 9.0.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.8">Fixed >in Apache Tomcat 9.0.8</a></li><li><a >href="#Fixed_in_Apache_Tomcat_9.0.5">Fixed in Apache Tomcat >9.0.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.2">Fixed in Apache >Tomcat 9.0.2</a></li><li ><a href="#Fixed_in_Apache_Tomcat_9.0.1">Fixed in Apache Tomcat >9.0.1</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M22">Fixed in Apache >Tomcat 9.0.0.M22</a></li><li><a >href="#Fixed_in_Apache_Tomcat_9.0.0.M21">Fixed in Apache Tomcat >9.0.0.M21</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M19">Fixed in >Apache Tomcat 9.0.0.M19</a></li><li><a >href="#Fixed_in_Apache_Tomcat_9.0.0.M18">Fixed in Apache Tomcat >9.0.0.M18</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M17">Fixed in >Apache Tomcat 9.0.0.M17</a></li><li><a >href="#Fixed_in_Apache_Tomcat_9.0.0.M15">Fixed in Apache Tomcat >9.0.0.M15</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M13">Fixed in >Apache Tomcat 9.0.0.M13</a></li><li><a >href="#Fixed_in_Apache_Tomcat_9.0.0.M10">Fixed in Apache Tomcat >9.0.0.M10</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M8">Fixed in >Apache Tomcat 9.0.0.M8</a></li><li><a >href="#Fixed_in_Apache_Tomcat_9.0.0.M3">Fixed in Apache Tomcat >9.0.0.M3</a></li><li><a href="#Not_a_vulnerability _in_Tomcat">Not a vulnerability in Tomcat</a></li></ul> + </div><h3 id="Fixed_in_Apache_Tomcat_9.0.81"><span class="pull-right">2023-10-10</span> Fixed in Apache Tomcat 9.0.81</h3><div class="text"> + + <p><strong>Important: Request smuggling</strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45648" rel="nofollow">CVE-2023-45648</a></p> + + <p>Tomcat did not correctly parse HTTP trailer headers. A specially crafted, + invalid trailer header could cause Tomcat to treat a single request as + multiple requests leading to the possibility of request smuggling when + behind a reverse proxy.</p> + + <p>This was fixed with commit + <a href="https://github.com/apache/tomcat/commit/59583245639d8c42ae0009f4a4a70464d3ea70a0">59583245</a>.</p> + + <p>This issue was reported to the Tomcat Security Team on 12 September 2023. + The issue was made public on 10 October 2023.</p> + + <p>Affects: 9.0.0-M1 to 9.0.80</p> + + <p><strong>Important: Denial of Service</strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44487" rel="nofollow">CVE-2023-44487</a></p> + + <p>Tomcat's HTTP/2 implementation was vulnerable to the rapid reset + attack. The denial of service typically manifested as an + <code>OutOfMemoryError</code>.</p> + + <p>This was fixed with commit + <a href="https://github.com/apache/tomcat/commit/6d1a9fd6642387969e4410b9989c85856b74917a">6d1a9fd6</a>.</p> + + <p>This issue was reported to the Tomcat Security Team on 14 September 2023. + The issue was made public on 10 October 2023.</p> + + <p>Affects: 9.0.0-M1 to 9.0.80</p> + + <p><strong>Important: Information Disclosure</strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42795" rel="nofollow">CVE-2023-42795</a></p> + + <p>When recycling various internal objects, including the request and the + response, prior to re-use by the next request/response, an error could + cause Tomcat to skip some parts of the recycling process leading to + information leaking from the current request/response to the next.</p> + + <p>This was fixed with commit + <a href="https://github.com/apache/tomcat/commit/44d05d75d696ca10ce251e4e370511e38f20ae75">44d05d75</a>.</p> + + <p>This issue was identified by the Tomcat Security Team on 13 September + 2023. The issue was made public on 10 October 2023.</p> + + <p>Affects: 9.0.0-M1 to 9.0.80</p> + + <p><strong>Low: Denial of Service</strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42794" rel="nofollow">CVE-2023-42794</a></p> + + <p>Tomcat's internal fork of a Commons FileUpload included an unreleased, in + progress refactoring that exposed a potential denial of service on + Windows if a web application opened a stream for an uploaded file but + failed to close the stream. The file would never be deleted from disk + creating the possibility of an eventual denial of service due to the disk + being full.</p> + + <p>This was fixed with commit + <a href="https://github.com/apache/tomcat/commit/43b882b8a577684498ab9b8851aa0427216784f7">43b882b8</a>.</p> + + <p>This issue was reported to the Tomcat Security Team on 1 September + 2023. The issue was made public on 10 October 2023.</p> + + <p>Affects: 9.0.70 to 9.0.80</p> + </div><h3 id="Fixed_in_Apache_Tomcat_9.0.80"><span class="pull-right">2023-08-25</span> Fixed in Apache Tomcat 9.0.80</h3><div class="text"> <p><strong>Moderate: Open redirect</strong> Modified: tomcat/site/trunk/xdocs/security-10.xml URL: http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-10.xml?rev=1912868&r1=1912867&r2=1912868&view=diff ============================================================================== --- tomcat/site/trunk/xdocs/security-10.xml (original) +++ tomcat/site/trunk/xdocs/security-10.xml Tue Oct 10 12:14:27 2023 @@ -56,6 +56,57 @@ <toc/> </section> + <section name="Fixed in Apache Tomcat 10.0.14" rtext="2023-10-10"> + + <p><strong>Important: Request smuggling</strong> + <cve>CVE-2023-45648</cve></p> + + <p>Tomcat did not correctly parse HTTP trailer headers. A specially crafted, + invalid trailer header could cause Tomcat to treat a single request as + multiple requests leading to the possibility of request smuggling when + behind a reverse proxy.</p> + + <p>This was fixed with commit + <hashlink hash="8ecff306507be8e4fd3adee1ae5de1ea6661a8f4"/>.</p> + + <p>This issue was reported to the Tomcat Security Team on 12 September 2023. + The issue was made public on 10 October 2023.</p> + + <p>Affects: 10.1.0-M1 to 10.1.13</p> + + <p><strong>Important: Denial of Service</strong> + <cve>CVE-2023-44487</cve></p> + + <p>Tomcat's HTTP/2 implementation was vulnerable to the rapid reset + attack. The denial of service typically manifested as an + <code>OutOfMemoryError</code>.</p> + + <p>This was fixed with commit + <hashlink hash="76bb4bfbfeae827dce896f650655bbf6e251ed49"/>.</p> + + <p>This issue was reported to the Tomcat Security Team on 14 September 2023. + The issue was made public on 10 October 2023.</p> + + <p>Affects: 10.1.0-M1 to 10.1.13</p> + + <p><strong>Important: Information Disclosure</strong> + <cve>CVE-2023-42795</cve></p> + + <p>When recycling various internal objects, including the request and the + response, prior to re-use by the next request/response, an error could + cause Tomcat to skip some parts of the recycling process leading to + information leaking from the current request/response to the next.</p> + + <p>This was fixed with commit + <hashlink hash="9375d67106f8df9eb9d7b360b2bef052fe67d3d4"/>.</p> + + <p>This issue was identified by the Tomcat Security Team on 13 September + 2023. The issue was made public on 10 October 2023.</p> + + <p>Affects: 10.1.0-M1 to 10.1.13</p> + + </section> + <section name="Fixed in Apache Tomcat 10.1.13" rtext="2023-08-25"> <p><strong>Moderate: Open redirect</strong> Modified: tomcat/site/trunk/xdocs/security-11.xml URL: http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-11.xml?rev=1912868&r1=1912867&r2=1912868&view=diff ============================================================================== --- tomcat/site/trunk/xdocs/security-11.xml (original) +++ tomcat/site/trunk/xdocs/security-11.xml Tue Oct 10 12:14:27 2023 @@ -50,6 +50,57 @@ <toc/> </section> + <section name="Fixed in Apache Tomcat 11.0.0-M12" rtext="2023-10-10"> + + <p><strong>Important: Request smuggling</strong> + <cve>CVE-2023-45648</cve></p> + + <p>Tomcat did not correctly parse HTTP trailer headers. A specially crafted, + invalid trailer header could cause Tomcat to treat a single request as + multiple requests leading to the possibility of request smuggling when + behind a reverse proxy.</p> + + <p>This was fixed with commit + <hashlink hash="eb5c094e5560764cda436362254997511a3ca1f6"/>.</p> + + <p>This issue was reported to the Tomcat Security Team on 12 September 2023. + The issue was made public on 10 October 2023.</p> + + <p>Affects: 11.0.0-M1 to 11.0.0-M11</p> + + <p><strong>Important: Denial of Service</strong> + <cve>CVE-2023-44487</cve></p> + + <p>Tomcat's HTTP/2 implementation was vulnerable to the rapid reset + attack. The denial of service typically manifested as an + <code>OutOfMemoryError</code>.</p> + + <p>This was fixed with commit + <hashlink hash="9cdfe25bad707f34b3e5da2994f3f1952a163c3e"/>.</p> + + <p>This issue was reported to the Tomcat Security Team on 14 September 2023. + The issue was made public on 10 October 2023.</p> + + <p>Affects: 11.0.0-M1 to 11.0.0-M11</p> + + <p><strong>Important: Information Disclosure</strong> + <cve>CVE-2023-42795</cve></p> + + <p>When recycling various internal objects, including the request and the + response, prior to re-use by the next request/response, an error could + cause Tomcat to skip some parts of the recycling process leading to + information leaking from the current request/response to the next.</p> + + <p>This was fixed with commit + <hashlink hash="d6db22e411307c97ddf78315c15d5889356eca38"/>.</p> + + <p>This issue was identified by the Tomcat Security Team on 13 September + 2023. The issue was made public on 10 October 2023.</p> + + <p>Affects: 11.0.0-M1 to 11.0.0-M11</p> + + </section> + <section name="Fixed in Apache Tomcat 11.0.0-M11" rtext="2023-08-25"> <p><strong>Moderate: Open redirect</strong> Modified: tomcat/site/trunk/xdocs/security-8.xml URL: http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-8.xml?rev=1912868&r1=1912867&r2=1912868&view=diff ============================================================================== --- tomcat/site/trunk/xdocs/security-8.xml (original) +++ tomcat/site/trunk/xdocs/security-8.xml Tue Oct 10 12:14:27 2023 @@ -56,6 +56,75 @@ <toc/> </section> + <section name="Fixed in Apache Tomcat 8.5.94" rtext="2023-10-10"> + + <p><strong>Important: Request smuggling</strong> + <cve>CVE-2023-45648</cve></p> + + <p>Tomcat did not correctly parse HTTP trailer headers. A specially crafted, + invalid trailer header could cause Tomcat to treat a single request as + multiple requests leading to the possibility of request smuggling when + behind a reverse proxy.</p> + + <p>This was fixed with commit + <hashlink hash="59583245639d8c42ae0009f4a4a70464d3ea70a0"/>.</p> + + <p>This issue was reported to the Tomcat Security Team on 12 September 2023. + The issue was made public on 10 October 2023.</p> + + <p>Affects: 8.5.0 to 8.5.93</p> + + <p><strong>Important: Denial of Service</strong> + <cve>CVE-2023-44487</cve></p> + + <p>Tomcat's HTTP/2 implementation was vulnerable to the rapid reset + attack. The denial of service typically manifested as an + <code>OutOfMemoryError</code>.</p> + + <p>This was fixed with commit + <hashlink hash="944332bb15bd2f3bf76ec2caeb1ff0a58a3bc628"/>.</p> + + <p>This issue was reported to the Tomcat Security Team on 14 September 2023. + The issue was made public on 10 October 2023.</p> + + <p>Affects: 8.5.0 to 8.5.93</p> + + <p><strong>Important: Information Disclosure</strong> + <cve>CVE-2023-42795</cve></p> + + <p>When recycling various internal objects, including the request and the + response, prior to re-use by the next request/response, an error could + cause Tomcat to skip some parts of the recycling process leading to + information leaking from the current request/response to the next.</p> + + <p>This was fixed with commit + <hashlink hash="30f8063d7a9b4c43ae4722f5e382a76af1d7a6bf"/>.</p> + + <p>This issue was identified by the Tomcat Security Team on 13 September + 2023. The issue was made public on 10 October 2023.</p> + + <p>Affects: 8.5.0 to 8.5.93</p> + + <p><strong>Low: Denial of Service</strong> + <cve>CVE-2023-42794</cve></p> + + <p>Tomcat's internal fork of a Commons FileUpload included an unreleased, in + progress refactoring that exposed a potential denial of service on + Windows if a web application opened a stream for an uploaded file but + failed to close the stream. The file would never be deleted from disk + creating the possibility of an eventual denial of service due to the disk + being full.</p> + + <p>This was fixed with commit + <hashlink hash="c99ffc30e95ddc4daede564d08cb5ea2b9a9da65"/>.</p> + + <p>This issue was reported to the Tomcat Security Team on 1 September + 2023. The issue was made public on 10 October 2023.</p> + + <p>Affects: 8.5.85 to 8.5.93</p> + + </section> + <section name="Fixed in Apache Tomcat 8.5.93" rtext="2023-08-25"> <p><strong>Moderate: Open redirect</strong> Modified: tomcat/site/trunk/xdocs/security-9.xml URL: http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-9.xml?rev=1912868&r1=1912867&r2=1912868&view=diff ============================================================================== --- tomcat/site/trunk/xdocs/security-9.xml (original) +++ tomcat/site/trunk/xdocs/security-9.xml Tue Oct 10 12:14:27 2023 @@ -50,6 +50,75 @@ <toc/> </section> + <section name="Fixed in Apache Tomcat 9.0.81" rtext="2023-10-10"> + + <p><strong>Important: Request smuggling</strong> + <cve>CVE-2023-45648</cve></p> + + <p>Tomcat did not correctly parse HTTP trailer headers. A specially crafted, + invalid trailer header could cause Tomcat to treat a single request as + multiple requests leading to the possibility of request smuggling when + behind a reverse proxy.</p> + + <p>This was fixed with commit + <hashlink hash="59583245639d8c42ae0009f4a4a70464d3ea70a0"/>.</p> + + <p>This issue was reported to the Tomcat Security Team on 12 September 2023. + The issue was made public on 10 October 2023.</p> + + <p>Affects: 9.0.0-M1 to 9.0.80</p> + + <p><strong>Important: Denial of Service</strong> + <cve>CVE-2023-44487</cve></p> + + <p>Tomcat's HTTP/2 implementation was vulnerable to the rapid reset + attack. The denial of service typically manifested as an + <code>OutOfMemoryError</code>.</p> + + <p>This was fixed with commit + <hashlink hash="6d1a9fd6642387969e4410b9989c85856b74917a"/>.</p> + + <p>This issue was reported to the Tomcat Security Team on 14 September 2023. + The issue was made public on 10 October 2023.</p> + + <p>Affects: 9.0.0-M1 to 9.0.80</p> + + <p><strong>Important: Information Disclosure</strong> + <cve>CVE-2023-42795</cve></p> + + <p>When recycling various internal objects, including the request and the + response, prior to re-use by the next request/response, an error could + cause Tomcat to skip some parts of the recycling process leading to + information leaking from the current request/response to the next.</p> + + <p>This was fixed with commit + <hashlink hash="44d05d75d696ca10ce251e4e370511e38f20ae75"/>.</p> + + <p>This issue was identified by the Tomcat Security Team on 13 September + 2023. The issue was made public on 10 October 2023.</p> + + <p>Affects: 9.0.0-M1 to 9.0.80</p> + + <p><strong>Low: Denial of Service</strong> + <cve>CVE-2023-42794</cve></p> + + <p>Tomcat's internal fork of a Commons FileUpload included an unreleased, in + progress refactoring that exposed a potential denial of service on + Windows if a web application opened a stream for an uploaded file but + failed to close the stream. The file would never be deleted from disk + creating the possibility of an eventual denial of service due to the disk + being full.</p> + + <p>This was fixed with commit + <hashlink hash="43b882b8a577684498ab9b8851aa0427216784f7"/>.</p> + + <p>This issue was reported to the Tomcat Security Team on 1 September + 2023. The issue was made public on 10 October 2023.</p> + + <p>Affects: 9.0.70 to 9.0.80</p> + + </section> + <section name="Fixed in Apache Tomcat 9.0.80" rtext="2023-08-25"> <p><strong>Moderate: Open redirect</strong> --------------------------------------------------------------------- To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org For additional commands, e-mail: dev-h...@tomcat.apache.org