Author: jfclere Date: Sun Jul 22 08:11:28 2018 New Revision: 1836426 URL: http://svn.apache.org/viewvc?rev=1836426&view=rev Log: Add tc8.5.x missing CVE.
Modified: tomcat/site/trunk/docs/security-8.html tomcat/site/trunk/xdocs/security-8.xml Modified: tomcat/site/trunk/docs/security-8.html URL: http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-8.html?rev=1836426&r1=1836425&r2=1836426&view=diff ============================================================================== --- tomcat/site/trunk/docs/security-8.html (original) +++ tomcat/site/trunk/docs/security-8.html Sun Jul 22 08:11:28 2018 @@ -231,6 +231,9 @@ <a href="#Fixed_in_Apache_Tomcat_8.0.52">Fixed in Apache Tomcat 8.0.52</a> </li> <li> +<a href="#Fixed_in_Apache_Tomcat_8.5.31">Fixed in Apache Tomcat 8.5.31</a> +</li> +<li> <a href="#Fixed_in_Apache_Tomcat_8.0.50">Fixed in Apache Tomcat 8.0.50</a> </li> <li> @@ -427,6 +430,47 @@ <p> +<strong>Important: Due to a mishandling of close in NIO/NIO2 connectors user + sessions can get mixed up</strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8037" rel="nofollow">CVE-2018-8037</a> +</p> + + +<p>A bug in the tracking of connection closures can lead to reuse of user + sessions in a new connection</p> + + +<p>This was fixed in revision <a href="http://svn.apache.org/viewvc?view=rev&rev=1833907">1833907</a>.</p> + + +<p>This issue was reported to the Apache Tomcat Security Team by Dmitry + Treskunov on 16 June 2018 and made public on 22 July 2018.</p> + + +<p>Affects: 8.5.5 to 8.5.31</p> + + +<p> +<strong>Low: host name verification missing in WebSocket client</strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8034" rel="nofollow">CVE-2018-8034</a> +</p> + + +<p>The host name verification when using TLS with the WebSocket client was + missing. It is now enabled by default.</p> + + +<p>This was fixed in revision <a href="http://svn.apache.org/viewvc?view=rev&rev=1833758">1833758</a>.</p> + + +<p>This issue was reported publicly on 11 June 2018 and formally announced as + a vulnerability on 22 July 2018.</p> + + +<p>Affects: 8.5.0 to 8.5.31</p> + + +<p> <strong>Low: CORS filter has insecure defaults</strong> <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8014" rel="nofollow">CVE-2018-8014</a> </p> @@ -474,6 +518,33 @@ </div> +<h3 id="Fixed_in_Apache_Tomcat_8.5.31"> +<span class="pull-right">4 May 2018</span> Fixed in Apache Tomcat 8.5.31</h3> +<div class="text"> + + +<p> +<strong>Important: A bug in the UTF-8 decoder can lead to DoS</strong> + <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1336" rel="nofollow">CVE-2018-1336</a> +</p> + + +<p>An improper handing of overflow in the UTF-8 decoder with + supplementary characters can lead to an infinite loop in the + decoder causing a Denial of Service.</p> + + +<p>This was fixed in revision <a href="http://svn.apache.org/viewvc?view=rev&rev=1830374">1830374</a>.</p> + + +<p>This issue was reported publicly on 6 April 2018 and formally announced as + a vulnerability on 22 July 2018.</p> + + +<p>Affects: 8.5.0 to 8.5.30</p> + + +</div> <h3 id="Fixed_in_Apache_Tomcat_8.0.50"> <span class="pull-right">13 February 2018</span> Fixed in Apache Tomcat 8.0.50</h3> <div class="text"> Modified: tomcat/site/trunk/xdocs/security-8.xml URL: http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-8.xml?rev=1836426&r1=1836425&r2=1836426&view=diff ============================================================================== --- tomcat/site/trunk/xdocs/security-8.xml (original) +++ tomcat/site/trunk/xdocs/security-8.xml Sun Jul 22 08:11:28 2018 @@ -83,6 +83,33 @@ <section name="Fixed in Apache Tomcat 8.5.32" rtext="26 June 2018"> + <p><strong>Important: Due to a mishandling of close in NIO/NIO2 connectors user + sessions can get mixed up</strong> + <cve>CVE-2018-8037</cve></p> + + <p>A bug in the tracking of connection closures can lead to reuse of user + sessions in a new connection</p> + + <p>This was fixed in revision <revlink rev="1833907">1833907</revlink>.</p> + + <p>This issue was reported to the Apache Tomcat Security Team by Dmitry + Treskunov on 16 June 2018 and made public on 22 July 2018.</p> + + <p>Affects: 8.5.5 to 8.5.31</p> + + <p><strong>Low: host name verification missing in WebSocket client</strong> + <cve>CVE-2018-8034</cve></p> + + <p>The host name verification when using TLS with the WebSocket client was + missing. It is now enabled by default.</p> + + <p>This was fixed in revision <revlink rev="1833758">1833758</revlink>.</p> + + <p>This issue was reported publicly on 11 June 2018 and formally announced as + a vulnerability on 22 July 2018.</p> + + <p>Affects: 8.5.0 to 8.5.31</p> + <p><strong>Low: CORS filter has insecure defaults</strong> <cve>CVE-2018-8014</cve></p> @@ -117,6 +144,24 @@ </section> + <section name="Fixed in Apache Tomcat 8.5.31" rtext="4 May 2018"> + + <p><strong>Important: A bug in the UTF-8 decoder can lead to DoS</strong> + <cve>CVE-2018-1336</cve></p> + + <p>An improper handing of overflow in the UTF-8 decoder with + supplementary characters can lead to an infinite loop in the + decoder causing a Denial of Service.</p> + + <p>This was fixed in revision <revlink rev="1830374">1830374</revlink>.</p> + + <p>This issue was reported publicly on 6 April 2018 and formally announced as + a vulnerability on 22 July 2018.</p> + + <p>Affects: 8.5.0 to 8.5.30</p> + + </section> + <section name="Fixed in Apache Tomcat 8.0.50" rtext="13 February 2018"> <p><strong>Important: Security constraint annotations applied too --------------------------------------------------------------------- To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org For additional commands, e-mail: dev-h...@tomcat.apache.org