Author: markt
Date: Tue Dec 17 12:25:38 2024
New Revision: 1922564

URL: http://svn.apache.org/viewvc?rev=1922564&view=rev
Log:
Add CVE-2024-50379 and CVE-2024-54677

Modified:
    tomcat/site/trunk/docs/security-10.html
    tomcat/site/trunk/docs/security-11.html
    tomcat/site/trunk/docs/security-9.html
    tomcat/site/trunk/xdocs/security-10.xml
    tomcat/site/trunk/xdocs/security-11.xml
    tomcat/site/trunk/xdocs/security-9.xml

Modified: tomcat/site/trunk/docs/security-10.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-10.html?rev=1922564&r1=1922563&r2=1922564&view=diff
==============================================================================
--- tomcat/site/trunk/docs/security-10.html (original)
+++ tomcat/site/trunk/docs/security-10.html Tue Dec 17 12:25:38 2024
@@ -42,7 +42,48 @@
     </p>
 
   </div><h3 id="Table_of_Contents">Table of Contents</h3><div class="text">
-    <ul><li><a href="#Fixed_in_Apache_Tomcat_10.1.33">Fixed in Apache Tomcat 
10.1.33</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.31">Fixed in Apache 
Tomcat 10.1.31</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.25">Fixed in 
Apache Tomcat 10.1.25</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.19">Fixed in Apache Tomcat 
10.1.19</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.16">Fixed in Apache 
Tomcat 10.1.16</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.14">Fixed in 
Apache Tomcat 10.1.14</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.13">Fixed in Apache Tomcat 
10.1.13</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.9">Fixed in Apache 
Tomcat 10.1.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.8">Fixed in 
Apache Tomcat 10.1.8</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.6">Fixed 
in Apache Tomcat 10.1.6</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.5">Fixed in Apache Tomcat 
10.1.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.2">Fixed in Apache T
 omcat 10.1.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.1">Fixed in 
Apache Tomcat 10.1.1</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.27">Fixed in Apache Tomcat 
10.0.27</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.23">Fixed in Apache 
Tomcat 10.0.23</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M17">Fixed 
in Apache Tomcat 10.1.0-M17</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.21">Fixed in Apache Tomcat 
10.0.21</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M15">Fixed in 
Apache Tomcat 10.1.0-M15</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.20">Fixed in Apache Tomcat 
10.0.20</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M14">Fixed in 
Apache Tomcat 10.1.0-M14</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.16">Fixed in Apache Tomcat 
10.0.16</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M10">Fixed in 
Apache Tomcat 10.1.0-M10</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.12">Fixed in Apache Tomcat 
10.0.12</a></li><li><a href="#Fixed
 _in_Apache_Tomcat_10.1.0-M6">Fixed in Apache Tomcat 10.1.0-M6</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.7">Fixed in Apache Tomcat 
10.0.7</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.6">Fixed in Apache 
Tomcat 10.0.6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.5">Fixed in 
Apache Tomcat 10.0.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.4">Fixed 
in Apache Tomcat 10.0.4</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.2">Fixed in Apache Tomcat 
10.0.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M10">Fixed in Apache 
Tomcat 10.0.0-M10</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M8">Fixed 
in Apache Tomcat 10.0.0-M8</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.0-M7">Fixed in Apache Tomcat 
10.0.0-M7</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M6">Fixed in 
Apache Tomcat 10.0.0-M6</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.0-M5">Fixed in Apache Tomcat 
10.0.0-M5</a></li><li><a href="#Not_a_vulnerability_in_Tomcat">Not a 
vulnerability 
 in Tomcat</a></li></ul>
+    <ul><li><a href="#Fixed_in_Apache_Tomcat_10.1.34">Fixed in Apache Tomcat 
10.1.34</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.33">Fixed in Apache 
Tomcat 10.1.33</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.31">Fixed in 
Apache Tomcat 10.1.31</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.25">Fixed in Apache Tomcat 
10.1.25</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.19">Fixed in Apache 
Tomcat 10.1.19</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.16">Fixed in 
Apache Tomcat 10.1.16</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.14">Fixed in Apache Tomcat 
10.1.14</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.13">Fixed in Apache 
Tomcat 10.1.13</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.9">Fixed in 
Apache Tomcat 10.1.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.8">Fixed 
in Apache Tomcat 10.1.8</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.6">Fixed in Apache Tomcat 
10.1.6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.5">Fixed in Apache
  Tomcat 10.1.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.2">Fixed in 
Apache Tomcat 10.1.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.1">Fixed 
in Apache Tomcat 10.1.1</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.27">Fixed in Apache Tomcat 
10.0.27</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.23">Fixed in Apache 
Tomcat 10.0.23</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M17">Fixed 
in Apache Tomcat 10.1.0-M17</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.21">Fixed in Apache Tomcat 
10.0.21</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M15">Fixed in 
Apache Tomcat 10.1.0-M15</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.20">Fixed in Apache Tomcat 
10.0.20</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M14">Fixed in 
Apache Tomcat 10.1.0-M14</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.16">Fixed in Apache Tomcat 
10.0.16</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M10">Fixed in 
Apache Tomcat 10.1.0-M10</a></li><li><a href="#Fixed
 _in_Apache_Tomcat_10.0.12">Fixed in Apache Tomcat 10.0.12</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.0-M6">Fixed in Apache Tomcat 
10.1.0-M6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.7">Fixed in Apache 
Tomcat 10.0.7</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.6">Fixed in 
Apache Tomcat 10.0.6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.5">Fixed 
in Apache Tomcat 10.0.5</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.4">Fixed in Apache Tomcat 
10.0.4</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.2">Fixed in Apache 
Tomcat 10.0.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M10">Fixed in 
Apache Tomcat 10.0.0-M10</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.0-M8">Fixed in Apache Tomcat 
10.0.0-M8</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M7">Fixed in 
Apache Tomcat 10.0.0-M7</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.0-M6">Fixed in Apache Tomcat 
10.0.0-M6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M5">Fixed in 
Apache Tomca
 t 10.0.0-M5</a></li><li><a href="#Not_a_vulnerability_in_Tomcat">Not a 
vulnerability in Tomcat</a></li></ul>
+  </div><h3 id="Fixed_in_Apache_Tomcat_10.1.34"><span 
class="pull-right">2024-12-09</span> Fixed in Apache Tomcat 10.1.34</h3><div 
class="text">
+  
+    <p><strong>Low: DoS in examples web application</strong>
+
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54677"; 
rel="nofollow">CVE-2024-54677</a></p>
+
+    <p>Numerous examples in the examples web application did not place limits 
on
+       uploaded data enabling an OutOfMemoryError to be triggered causing a
+       denial of service.</p>
+
+    <p>This was fixed with commits
+       <a 
href="https://github.com/apache/tomcat/commit/f57a9d9847c1038be61f5818d73b8be907c460d4";>f57a9d98</a>,
+       <a 
href="https://github.com/apache/tomcat/commit/aa5b4d0043289cf054f531ec55126c980d3572e1";>aa5b4d00</a>,
+       <a 
href="https://github.com/apache/tomcat/commit/e8c16cdba833884e1bd49fff1f1cb699da177585";>e8c16cdb</a>,
+       <a 
href="https://github.com/apache/tomcat/commit/dbec927859d9484cb8bd680a7c67b1a560f48444";>dbec9278</a>,
+       <a 
href="https://github.com/apache/tomcat/commit/d63a10afc142b12f462a15f7d10f79fd80ff94eb";>d63a10af</a>,
+       <a 
href="https://github.com/apache/tomcat/commit/54e56495e9a106218efe9fc9c79d976c0032bbfd";>54e56495</a>
 and
+       <a 
href="https://github.com/apache/tomcat/commit/bbd82e9593314ade4cfd57248f9285fbad686f66";>bbd82e95</a>.</p>
+
+    <p>The issue was made public on 17 December 2024.</p>
+
+    <p>Affects: 10.1.0-M1 to 10.1.33</p>
+
+    <p><strong>Important: Remote Code Execution via write enabled Default 
Servlet</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50379"; 
rel="nofollow">CVE-2024-50379</a></p>
+
+    <p>If the default servlet is write enabled (<code>readonly</code>
+       initialisation parameter set to the non-default value of
+       <code>false</code>) for a case insensitive file system, concurrent read
+       and upload under load of the same file can bypass Tomcat's case
+       sensitivity checks and cause an uploaded file to be treated as a JSP
+       leading to remote code execution.</p>
+
+    <p>This was fixed with commits
+       <a 
href="https://github.com/apache/tomcat/commit/8554f6b1722b33a2ce8b0a3fad37825f3a75f2d2";>8554f6b1</a>
 and
+       <a 
href="https://github.com/apache/tomcat/commit/05ddeeaa54df1e2dc427d0164bedd6b79f78d81f";>05ddeeaa</a>.</p>
+
+    <p>The issue was made public on 17 December 2024.</p>
+
+    <p>Affects: 10.1.0-M1 to 10.1.33</p>
+  
   </div><h3 id="Fixed_in_Apache_Tomcat_10.1.33"><span 
class="pull-right">2024-11-11</span> Fixed in Apache Tomcat 10.1.33</h3><div 
class="text">
 
     <p><i>Note: The issue below was fixed in Apache Tomcat 10.1.32 but the

Modified: tomcat/site/trunk/docs/security-11.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-11.html?rev=1922564&r1=1922563&r2=1922564&view=diff
==============================================================================
--- tomcat/site/trunk/docs/security-11.html (original)
+++ tomcat/site/trunk/docs/security-11.html Tue Dec 17 12:25:38 2024
@@ -36,7 +36,48 @@
     </p>
 
   </div><h3 id="Table_of_Contents">Table of Contents</h3><div class="text">
-    <ul><li><a href="#Fixed_in_Apache_Tomcat_11.0.1">Fixed in Apache Tomcat 
11.0.1</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0">Fixed in Apache 
Tomcat 11.0.0</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M21">Fixed in 
Apache Tomcat 11.0.0-M21</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.0-M17">Fixed in Apache Tomcat 
11.0.0-M17</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M12">Fixed in 
Apache Tomcat 11.0.0-M12</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.0-M11">Fixed in Apache Tomcat 
11.0.0-M11</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M6">Fixed in 
Apache Tomcat 11.0.0-M6</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.0-M5">Fixed in Apache Tomcat 
11.0.0-M5</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M3">Fixed in 
Apache Tomcat 11.0.0-M3</a></li></ul>
+    <ul><li><a href="#Fixed_in_Apache_Tomcat_11.0.2">Fixed in Apache Tomcat 
11.0.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.1">Fixed in Apache 
Tomcat 11.0.1</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0">Fixed in 
Apache Tomcat 11.0.0</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.0-M21">Fixed in Apache Tomcat 
11.0.0-M21</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M17">Fixed in 
Apache Tomcat 11.0.0-M17</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.0-M12">Fixed in Apache Tomcat 
11.0.0-M12</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M11">Fixed in 
Apache Tomcat 11.0.0-M11</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.0-M6">Fixed in Apache Tomcat 
11.0.0-M6</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M5">Fixed in 
Apache Tomcat 11.0.0-M5</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.0-M3">Fixed in Apache Tomcat 
11.0.0-M3</a></li></ul>
+  </div><h3 id="Fixed_in_Apache_Tomcat_11.0.2"><span 
class="pull-right">2024-12-09</span> Fixed in Apache Tomcat 11.0.2</h3><div 
class="text">
+  
+    <p><strong>Low: DoS in examples web application</strong>
+
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54677"; 
rel="nofollow">CVE-2024-54677</a></p>
+
+    <p>Numerous examples in the examples web application did not place limits 
on
+       uploaded data enabling an OutOfMemoryError to be triggered causing a
+       denial of service.</p>
+
+    <p>This was fixed with commits
+       <a 
href="https://github.com/apache/tomcat/commit/4f0236606961176257b883213e1621b1859ed746";>4f023660</a>,
+       <a 
href="https://github.com/apache/tomcat/commit/c0a23927ea5e061ca3fdff695138464179fe674a";>c0a23927</a>,
+       <a 
href="https://github.com/apache/tomcat/commit/b1f65728b37d7d227a0764344473b7e261a13408";>b1f65728</a>,
+       <a 
href="https://github.com/apache/tomcat/commit/a95bf2b0303442a2c9a1ac364b0e63b56049e33a";>a95bf2b0</a>,
+       <a 
href="https://github.com/apache/tomcat/commit/4a335c6dcba8d6f8a54629eda392a50da267bdf4";>4a335c6d</a>,
+       <a 
href="https://github.com/apache/tomcat/commit/722814668708c42a61b0c1e340b15bc2b785c0d1";>72281466</a>
 and
+       <a 
href="https://github.com/apache/tomcat/commit/cb1707685472994e9d924746f8c91cb116fa5213";>cb170768</a>.</p>
+
+    <p>The issue was made public on 17 December 2024.</p>
+
+    <p>Affects: 11.0.0-M1 to 11.0.1</p>
+  
+    <p><strong>Important: Remote Code Execution via write enabled Default 
Servlet</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50379"; 
rel="nofollow">CVE-2024-50379</a></p>
+
+    <p>If the default servlet is write enabled (<code>readonly</code>
+       initialisation parameter set to the non-default value of
+       <code>false</code>) for a case insensitive file system, concurrent read
+       and upload under load of the same file can bypass Tomcat's case
+       sensitivity checks and cause an uploaded file to be treated as a JSP
+       leading to remote code execution.</p>
+
+    <p>This was fixed with commits
+       <a 
href="https://github.com/apache/tomcat/commit/cc7a98b57c6dc1df21979fcff94a36e068f4456c";>cc7a98b5</a>
 and
+       <a 
href="https://github.com/apache/tomcat/commit/684247ae85fa633b9197b32391de59fc54703842";>684247ae</a>.</p>
+
+    <p>The issue was made public on 17 December 2024.</p>
+
+    <p>Affects: 11.0.0-M1 to 11.0.1</p>
+  
   </div><h3 id="Fixed_in_Apache_Tomcat_11.0.1"><span 
class="pull-right">2024-11-10</span> Fixed in Apache Tomcat 11.0.1</h3><div 
class="text">
 
     <p><strong>Important: XSS in generated JSPs</strong>

Modified: tomcat/site/trunk/docs/security-9.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-9.html?rev=1922564&r1=1922563&r2=1922564&view=diff
==============================================================================
--- tomcat/site/trunk/docs/security-9.html (original)
+++ tomcat/site/trunk/docs/security-9.html Tue Dec 17 12:25:38 2024
@@ -36,7 +36,50 @@
     </p>
 
   </div><h3 id="Table_of_Contents">Table of Contents</h3><div class="text">
-    <ul><li><a href="#Fixed_in_Apache_Tomcat_9.0.97">Fixed in Apache Tomcat 
9.0.97</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.96">Fixed in Apache 
Tomcat 9.0.96</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.90">Fixed in 
Apache Tomcat 9.0.90</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.86">Fixed 
in Apache Tomcat 9.0.86</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.83">Fixed in Apache Tomcat 
9.0.83</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.81">Fixed in Apache 
Tomcat 9.0.81</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.80">Fixed in 
Apache Tomcat 9.0.80</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.75">Fixed 
in Apache Tomcat 9.0.75</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.74">Fixed in Apache Tomcat 
9.0.74</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.72">Fixed in Apache 
Tomcat 9.0.72</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.71">Fixed in 
Apache Tomcat 9.0.71</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.69">Fixed 
in Apache Tomcat 9.0.69</
 a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.68">Fixed in Apache Tomcat 
9.0.68</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.65">Fixed in Apache 
Tomcat 9.0.65</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.63">Fixed in 
Apache Tomcat 9.0.63</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.62">Fixed 
in Apache Tomcat 9.0.62</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.58">Fixed in Apache Tomcat 
9.0.58</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.54">Fixed in Apache 
Tomcat 9.0.54</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.48">Fixed in 
Apache Tomcat 9.0.48</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.46">Fixed 
in Apache Tomcat 9.0.46</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.45">Fixed in Apache Tomcat 
9.0.45</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.44">Fixed in Apache 
Tomcat 9.0.44</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.43">Fixed in 
Apache Tomcat 9.0.43</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.40">Fixed 
in Apache Tomcat 9.0.40</a
 ></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.38">Fixed in Apache Tomcat 
 >9.0.38</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.37">Fixed in Apache 
 >Tomcat 9.0.37</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.36">Fixed in 
 >Apache Tomcat 9.0.36</a></li><li><a 
 >href="#Fixed_in_Apache_Tomcat_9.0.35">Fixed in Apache Tomcat 
 >9.0.35</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.31">Fixed in Apache 
 >Tomcat 9.0.31</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.30">Fixed in 
 >Apache Tomcat 9.0.30</a></li><li><a 
 >href="#Fixed_in_Apache_Tomcat_9.0.29">Fixed in Apache Tomcat 
 >9.0.29</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.21">Fixed in Apache 
 >Tomcat 9.0.21</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.20">Fixed in 
 >Apache Tomcat 9.0.20</a></li><li><a 
 >href="#Fixed_in_Apache_Tomcat_9.0.19">Fixed in Apache Tomcat 
 >9.0.19</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.16">Fixed in Apache 
 >Tomcat 9.0.16</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.12">Fixed in 
 >Apache Tomcat 9.0.12</a>
 </li><li><a href="#Fixed_in_Apache_Tomcat_9.0.10">Fixed in Apache Tomcat 
9.0.10</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.9">Fixed in Apache 
Tomcat 9.0.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.8">Fixed in 
Apache Tomcat 9.0.8</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.5">Fixed 
in Apache Tomcat 9.0.5</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.2">Fixed in Apache Tomcat 
9.0.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.1">Fixed in Apache 
Tomcat 9.0.1</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M22">Fixed in 
Apache Tomcat 9.0.0.M22</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.0.M21">Fixed in Apache Tomcat 
9.0.0.M21</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M19">Fixed in 
Apache Tomcat 9.0.0.M19</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.0.M18">Fixed in Apache Tomcat 
9.0.0.M18</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M17">Fixed in 
Apache Tomcat 9.0.0.M17</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.0.M15">Fixed in Ap
 ache Tomcat 9.0.0.M15</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.0.M13">Fixed in Apache Tomcat 
9.0.0.M13</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M10">Fixed in 
Apache Tomcat 9.0.0.M10</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.0.M8">Fixed in Apache Tomcat 
9.0.0.M8</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M3">Fixed in Apache 
Tomcat 9.0.0.M3</a></li><li><a href="#Not_a_vulnerability_in_Tomcat">Not a 
vulnerability in Tomcat</a></li></ul>
+    <ul><li><a href="#Fixed_in_Apache_Tomcat_9.0.98">Fixed in Apache Tomcat 
9.0.98</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.97">Fixed in Apache 
Tomcat 9.0.97</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.96">Fixed in 
Apache Tomcat 9.0.96</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.90">Fixed 
in Apache Tomcat 9.0.90</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.86">Fixed in Apache Tomcat 
9.0.86</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.83">Fixed in Apache 
Tomcat 9.0.83</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.81">Fixed in 
Apache Tomcat 9.0.81</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.80">Fixed 
in Apache Tomcat 9.0.80</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.75">Fixed in Apache Tomcat 
9.0.75</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.74">Fixed in Apache 
Tomcat 9.0.74</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.72">Fixed in 
Apache Tomcat 9.0.72</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.71">Fixed 
in Apache Tomcat 9.0.71</
 a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.69">Fixed in Apache Tomcat 
9.0.69</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.68">Fixed in Apache 
Tomcat 9.0.68</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.65">Fixed in 
Apache Tomcat 9.0.65</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.63">Fixed 
in Apache Tomcat 9.0.63</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.62">Fixed in Apache Tomcat 
9.0.62</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.58">Fixed in Apache 
Tomcat 9.0.58</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.54">Fixed in 
Apache Tomcat 9.0.54</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.48">Fixed 
in Apache Tomcat 9.0.48</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.46">Fixed in Apache Tomcat 
9.0.46</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.45">Fixed in Apache 
Tomcat 9.0.45</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.44">Fixed in 
Apache Tomcat 9.0.44</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.43">Fixed 
in Apache Tomcat 9.0.43</a
 ></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.40">Fixed in Apache Tomcat 
 >9.0.40</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.38">Fixed in Apache 
 >Tomcat 9.0.38</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.37">Fixed in 
 >Apache Tomcat 9.0.37</a></li><li><a 
 >href="#Fixed_in_Apache_Tomcat_9.0.36">Fixed in Apache Tomcat 
 >9.0.36</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.35">Fixed in Apache 
 >Tomcat 9.0.35</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.31">Fixed in 
 >Apache Tomcat 9.0.31</a></li><li><a 
 >href="#Fixed_in_Apache_Tomcat_9.0.30">Fixed in Apache Tomcat 
 >9.0.30</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.29">Fixed in Apache 
 >Tomcat 9.0.29</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.21">Fixed in 
 >Apache Tomcat 9.0.21</a></li><li><a 
 >href="#Fixed_in_Apache_Tomcat_9.0.20">Fixed in Apache Tomcat 
 >9.0.20</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.19">Fixed in Apache 
 >Tomcat 9.0.19</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.16">Fixed in 
 >Apache Tomcat 9.0.16</a>
 </li><li><a href="#Fixed_in_Apache_Tomcat_9.0.12">Fixed in Apache Tomcat 
9.0.12</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.10">Fixed in Apache 
Tomcat 9.0.10</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.9">Fixed in 
Apache Tomcat 9.0.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.8">Fixed 
in Apache Tomcat 9.0.8</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.5">Fixed in Apache Tomcat 
9.0.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.2">Fixed in Apache 
Tomcat 9.0.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.1">Fixed in 
Apache Tomcat 9.0.1</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.0.M22">Fixed in Apache Tomcat 
9.0.0.M22</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M21">Fixed in 
Apache Tomcat 9.0.0.M21</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.0.M19">Fixed in Apache Tomcat 
9.0.0.M19</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M18">Fixed in 
Apache Tomcat 9.0.0.M18</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.0.M17">Fixed in Apache T
 omcat 9.0.0.M17</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M15">Fixed 
in Apache Tomcat 9.0.0.M15</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.0.M13">Fixed in Apache Tomcat 
9.0.0.M13</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M10">Fixed in 
Apache Tomcat 9.0.0.M10</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.0.M8">Fixed in Apache Tomcat 
9.0.0.M8</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M3">Fixed in Apache 
Tomcat 9.0.0.M3</a></li><li><a href="#Not_a_vulnerability_in_Tomcat">Not a 
vulnerability in Tomcat</a></li></ul>
+  </div><h3 id="Fixed_in_Apache_Tomcat_9.0.98"><span 
class="pull-right">2024-12-09</span> Fixed in Apache Tomcat 9.0.98</h3><div 
class="text">
+  
+    <p><strong>Low: DoS in examples web application</strong>
+
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54677"; 
rel="nofollow">CVE-2024-54677</a></p>
+
+    <p>Numerous examples in the examples web application did not place limits 
on
+       uploaded data enabling an OutOfMemoryError to be triggered causing a
+       denial of service.</p>
+
+    <p>This was fixed with commits
+       <a 
href="https://github.com/apache/tomcat/commit/1d88dd3ffaed76188dd4ee32ce77709ce6e153cd";>1d88dd3f</a>,
+       <a 
href="https://github.com/apache/tomcat/commit/721544ea28e92549824b106be954a9f411867a1c";>721544ea</a>,
+       <a 
href="https://github.com/apache/tomcat/commit/84065e26ca4555e63a922bb29b13b0a1c86b7654";>84065e26</a>,
+       <a 
href="https://github.com/apache/tomcat/commit/3315a9027a7eaab18f42625b97b569940ff1365d";>3315a902</a>,
+       <a 
href="https://github.com/apache/tomcat/commit/c2f7ce21c3fb12caefee87c517a8bb4f80700044";>c2f7ce21</a>,
+       <a 
href="https://github.com/apache/tomcat/commit/75ff7e8622edcc024b268677aa789ee8f0880ecc";>75ff7e86</a>,
+       <a 
href="https://github.com/apache/tomcat/commit/4d5cc6538d91386f950373ac8120e98c2c78ed3a";>4d5cc653</a>,
+       <a 
href="https://github.com/apache/tomcat/commit/84c4af76e7a10fc7f8630ce62e6a46632ea4a90e";>84c4af76</a>
 and
+       <a 
href="https://github.com/apache/tomcat/commit/9ffd23fc27f5d1fc95bf97e5cea175c8968f4533";>9ffd23fc</a>.</p>
+
+    <p>The issue was made public on 17 December 2024.</p>
+
+    <p>Affects: 9.0.0.M1 to 9.0.97</p>
+
+    <p><strong>Important: Remote Code Execution via write enabled Default 
Servlet</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50379"; 
rel="nofollow">CVE-2024-50379</a></p>
+
+    <p>If the default servlet is write enabled (<code>readonly</code>
+       initialisation parameter set to the non-default value of
+       <code>false</code>) for a case insensitive file system, concurrent read
+       and upload under load of the same file can bypass Tomcat's case
+       sensitivity checks and cause an uploaded file to be treated as a JSP
+       leading to remote code execution.</p>
+
+    <p>This was fixed with commits
+       <a 
href="https://github.com/apache/tomcat/commit/43b507ebac9d268b1ea3d908e296cc6e46795c00";>43b507eb</a>
 and
+       <a 
href="https://github.com/apache/tomcat/commit/631500b0c9b2a2a2abb707e3de2e10a5936e5d41";>631500b0</a>.</p>
+
+    <p>The issue was made public on 17 December 2024.</p>
+
+    <p>Affects: 9.0.0.M1 to 9.0.97</p>
+  
   </div><h3 id="Fixed_in_Apache_Tomcat_9.0.97"><span 
class="pull-right">2024-11-09</span> Fixed in Apache Tomcat 9.0.97</h3><div 
class="text">
 
     <p><strong>Important: XSS in generated JSPs</strong>

Modified: tomcat/site/trunk/xdocs/security-10.xml
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-10.xml?rev=1922564&r1=1922563&r2=1922564&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/security-10.xml (original)
+++ tomcat/site/trunk/xdocs/security-10.xml Tue Dec 17 12:25:38 2024
@@ -56,6 +56,49 @@
     <toc/>
   </section>
 
+  <section name="Fixed in Apache Tomcat 10.1.34" rtext="2024-12-09">
+  
+    <p><strong>Low: DoS in examples web application</strong>
+
+       <cve>CVE-2024-54677</cve></p>
+
+    <p>Numerous examples in the examples web application did not place limits 
on
+       uploaded data enabling an OutOfMemoryError to be triggered causing a
+       denial of service.</p>
+
+    <p>This was fixed with commits
+       <hashlink hash="f57a9d9847c1038be61f5818d73b8be907c460d4"/>,
+       <hashlink hash="aa5b4d0043289cf054f531ec55126c980d3572e1"/>,
+       <hashlink hash="e8c16cdba833884e1bd49fff1f1cb699da177585"/>,
+       <hashlink hash="dbec927859d9484cb8bd680a7c67b1a560f48444"/>,
+       <hashlink hash="d63a10afc142b12f462a15f7d10f79fd80ff94eb"/>,
+       <hashlink hash="54e56495e9a106218efe9fc9c79d976c0032bbfd"/> and
+       <hashlink hash="bbd82e9593314ade4cfd57248f9285fbad686f66"/>.</p>
+
+    <p>The issue was made public on 17 December 2024.</p>
+
+    <p>Affects: 10.1.0-M1 to 10.1.33</p>
+
+    <p><strong>Important: Remote Code Execution via write enabled Default 
Servlet</strong>
+       <cve>CVE-2024-50379</cve></p>
+
+    <p>If the default servlet is write enabled (<code>readonly</code>
+       initialisation parameter set to the non-default value of
+       <code>false</code>) for a case insensitive file system, concurrent read
+       and upload under load of the same file can bypass Tomcat's case
+       sensitivity checks and cause an uploaded file to be treated as a JSP
+       leading to remote code execution.</p>
+
+    <p>This was fixed with commits
+       <hashlink hash="8554f6b1722b33a2ce8b0a3fad37825f3a75f2d2"/> and
+       <hashlink hash="05ddeeaa54df1e2dc427d0164bedd6b79f78d81f"/>.</p>
+
+    <p>The issue was made public on 17 December 2024.</p>
+
+    <p>Affects: 10.1.0-M1 to 10.1.33</p>
+  
+  </section>
+
   <section name="Fixed in Apache Tomcat 10.1.33" rtext="2024-11-11">
 
     <p><i>Note: The issue below was fixed in Apache Tomcat 10.1.32 but the

Modified: tomcat/site/trunk/xdocs/security-11.xml
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-11.xml?rev=1922564&r1=1922563&r2=1922564&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/security-11.xml (original)
+++ tomcat/site/trunk/xdocs/security-11.xml Tue Dec 17 12:25:38 2024
@@ -50,6 +50,49 @@
     <toc/>
   </section>
 
+  <section name="Fixed in Apache Tomcat 11.0.2" rtext="2024-12-09">
+  
+    <p><strong>Low: DoS in examples web application</strong>
+
+       <cve>CVE-2024-54677</cve></p>
+
+    <p>Numerous examples in the examples web application did not place limits 
on
+       uploaded data enabling an OutOfMemoryError to be triggered causing a
+       denial of service.</p>
+
+    <p>This was fixed with commits
+       <hashlink hash="4f0236606961176257b883213e1621b1859ed746"/>,
+       <hashlink hash="c0a23927ea5e061ca3fdff695138464179fe674a"/>,
+       <hashlink hash="b1f65728b37d7d227a0764344473b7e261a13408"/>,
+       <hashlink hash="a95bf2b0303442a2c9a1ac364b0e63b56049e33a"/>,
+       <hashlink hash="4a335c6dcba8d6f8a54629eda392a50da267bdf4"/>,
+       <hashlink hash="722814668708c42a61b0c1e340b15bc2b785c0d1"/> and
+       <hashlink hash="cb1707685472994e9d924746f8c91cb116fa5213"/>.</p>
+
+    <p>The issue was made public on 17 December 2024.</p>
+
+    <p>Affects: 11.0.0-M1 to 11.0.1</p>
+  
+    <p><strong>Important: Remote Code Execution via write enabled Default 
Servlet</strong>
+       <cve>CVE-2024-50379</cve></p>
+
+    <p>If the default servlet is write enabled (<code>readonly</code>
+       initialisation parameter set to the non-default value of
+       <code>false</code>) for a case insensitive file system, concurrent read
+       and upload under load of the same file can bypass Tomcat's case
+       sensitivity checks and cause an uploaded file to be treated as a JSP
+       leading to remote code execution.</p>
+
+    <p>This was fixed with commits
+       <hashlink hash="cc7a98b57c6dc1df21979fcff94a36e068f4456c"/> and
+       <hashlink hash="684247ae85fa633b9197b32391de59fc54703842"/>.</p>
+
+    <p>The issue was made public on 17 December 2024.</p>
+
+    <p>Affects: 11.0.0-M1 to 11.0.1</p>
+  
+  </section>
+
   <section name="Fixed in Apache Tomcat 11.0.1" rtext="2024-11-10">
 
     <p><strong>Important: XSS in generated JSPs</strong>

Modified: tomcat/site/trunk/xdocs/security-9.xml
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-9.xml?rev=1922564&r1=1922563&r2=1922564&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/security-9.xml (original)
+++ tomcat/site/trunk/xdocs/security-9.xml Tue Dec 17 12:25:38 2024
@@ -50,6 +50,51 @@
     <toc/>
   </section>
 
+  <section name="Fixed in Apache Tomcat 9.0.98" rtext="2024-12-09">
+  
+    <p><strong>Low: DoS in examples web application</strong>
+
+       <cve>CVE-2024-54677</cve></p>
+
+    <p>Numerous examples in the examples web application did not place limits 
on
+       uploaded data enabling an OutOfMemoryError to be triggered causing a
+       denial of service.</p>
+
+    <p>This was fixed with commits
+       <hashlink hash="1d88dd3ffaed76188dd4ee32ce77709ce6e153cd"/>,
+       <hashlink hash="721544ea28e92549824b106be954a9f411867a1c"/>,
+       <hashlink hash="84065e26ca4555e63a922bb29b13b0a1c86b7654"/>,
+       <hashlink hash="3315a9027a7eaab18f42625b97b569940ff1365d"/>,
+       <hashlink hash="c2f7ce21c3fb12caefee87c517a8bb4f80700044"/>,
+       <hashlink hash="75ff7e8622edcc024b268677aa789ee8f0880ecc"/>,
+       <hashlink hash="4d5cc6538d91386f950373ac8120e98c2c78ed3a"/>,
+       <hashlink hash="84c4af76e7a10fc7f8630ce62e6a46632ea4a90e"/> and
+       <hashlink hash="9ffd23fc27f5d1fc95bf97e5cea175c8968f4533"/>.</p>
+
+    <p>The issue was made public on 17 December 2024.</p>
+
+    <p>Affects: 9.0.0.M1 to 9.0.97</p>
+
+    <p><strong>Important: Remote Code Execution via write enabled Default 
Servlet</strong>
+       <cve>CVE-2024-50379</cve></p>
+
+    <p>If the default servlet is write enabled (<code>readonly</code>
+       initialisation parameter set to the non-default value of
+       <code>false</code>) for a case insensitive file system, concurrent read
+       and upload under load of the same file can bypass Tomcat's case
+       sensitivity checks and cause an uploaded file to be treated as a JSP
+       leading to remote code execution.</p>
+
+    <p>This was fixed with commits
+       <hashlink hash="43b507ebac9d268b1ea3d908e296cc6e46795c00"/> and
+       <hashlink hash="631500b0c9b2a2a2abb707e3de2e10a5936e5d41"/>.</p>
+
+    <p>The issue was made public on 17 December 2024.</p>
+
+    <p>Affects: 9.0.0.M1 to 9.0.97</p>
+  
+  </section>
+
   <section name="Fixed in Apache Tomcat 9.0.97" rtext="2024-11-09">
 
     <p><strong>Important: XSS in generated JSPs</strong>



---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org

Reply via email to