Author: markt
Date: Thu Jun 20 19:20:22 2019
New Revision: 1861711
URL: http://svn.apache.org/viewvc?rev=1861711&view=rev
Log:
Add CVE-2019-10072
Modified:
tomcat/site/trunk/docs/security-8.html
tomcat/site/trunk/docs/security-9.html
tomcat/site/trunk/xdocs/security-8.xml
tomcat/site/trunk/xdocs/security-9.xml
Modified: tomcat/site/trunk/docs/security-8.html
URL:
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-8.html?rev=1861711&r1=1861710&r2=1861711&view=diff
==============================================================================
--- tomcat/site/trunk/docs/security-8.html (original)
+++ tomcat/site/trunk/docs/security-8.html Thu Jun 20 19:20:22 2019
@@ -216,6 +216,9 @@
<a href="#Apache_Tomcat_8.x_vulnerabilities">Apache Tomcat 8.x
vulnerabilities</a>
</li>
<li>
+<a href="#Fixed_in_Apache_Tomcat_8.5.41">Fixed in Apache Tomcat 8.5.41</a>
+</li>
+<li>
<a href="#Fixed_in_Apache_Tomcat_8.5.40">Fixed in Apache Tomcat 8.5.40</a>
</li>
<li>
@@ -381,6 +384,39 @@
</div>
+<h3 id="Fixed_in_Apache_Tomcat_8.5.41">
+<span class="pull-right">13 May 2019</span> Fixed in Apache Tomcat 8.5.41</h3>
+<div class="text">
+
+
+<p>
+<strong>Important: Denial of Service</strong>
+ <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10072"
rel="nofollow">CVE-2019-10072</a>
+</p>
+
+
+<p>The fix for <a
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0199"
rel="nofollow">CVE-2019-0199</a> was incomplete and did not address
+ HTTP/2 connection window exhaustion on write. By not sending
+ WINDOW_UPDATE messages for the connection window (stream 0) clients were
+ able to cause server-side threads to block eventually leading to thread
+ exhaustion and a DoS.</p>
+
+
+<p>This was fixed with commits
+ <a href="https://github.com/apache/tomcat/commit/0bcd69c">0bcd69c</a>
and
+ <a
href="https://github.com/apache/tomcat/commit/8d14c6f">8d14c6f</a>.</p>
+
+
+<p>This issue was reported to the Apache Tomcat Security Team by John
+ Simpson of Trend Micro Security Research working with Trend Micro's Zero
+ Day Initiative on 26 April 2019. The issue was made public on 20 June
+ 2019.</p>
+
+
+<p>Affects: 8.5.0 to 8.5.40</p>
+
+
+</div>
<h3 id="Fixed_in_Apache_Tomcat_8.5.40">
<span class="pull-right">12 April 2019</span> Fixed in Apache Tomcat
8.5.40</h3>
<div class="text">
Modified: tomcat/site/trunk/docs/security-9.html
URL:
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-9.html?rev=1861711&r1=1861710&r2=1861711&view=diff
==============================================================================
--- tomcat/site/trunk/docs/security-9.html (original)
+++ tomcat/site/trunk/docs/security-9.html Thu Jun 20 19:20:22 2019
@@ -216,6 +216,9 @@
<a href="#Apache_Tomcat_9.x_vulnerabilities">Apache Tomcat 9.x
vulnerabilities</a>
</li>
<li>
+<a href="#Fixed_in_Apache_Tomcat_9.0.20">Fixed in Apache Tomcat 9.0.20</a>
+</li>
+<li>
<a href="#Fixed_in_Apache_Tomcat_9.0.19">Fixed in Apache Tomcat 9.0.19</a>
</li>
<li>
@@ -321,6 +324,39 @@
</div>
+<h3 id="Fixed_in_Apache_Tomcat_9.0.20">
+<span class="pull-right">13 May 2019</span> Fixed in Apache Tomcat 9.0.20</h3>
+<div class="text">
+
+
+<p>
+<strong>Important: Denial of Service</strong>
+ <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10072"
rel="nofollow">CVE-2019-10072</a>
+</p>
+
+
+<p>The fix for <a
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0199"
rel="nofollow">CVE-2019-0199</a> was incomplete and did not address
+ HTTP/2 connection window exhaustion on write. By not sending
+ WINDOW_UPDATE messages for the connection window (stream 0) clients were
+ able to cause server-side threads to block eventually leading to thread
+ exhaustion and a DoS.</p>
+
+
+<p>This was fixed with commits
+ <a href="https://github.com/apache/tomcat/commit/7f748eb">7f748eb</a>
and
+ <a
href="https://github.com/apache/tomcat/commit/ada725a">ada725a</a>.</p>
+
+
+<p>This issue was reported to the Apache Tomcat Security Team by John
+ Simpson of Trend Micro Security Research working with Trend Micro's Zero
+ Day Initiative on 26 April 2019. The issue was made public on 20 June
+ 2019.</p>
+
+
+<p>Affects: 9.0.0.M1 to 9.0.19</p>
+
+
+</div>
<h3 id="Fixed_in_Apache_Tomcat_9.0.19">
<span class="pull-right">13 April 2019</span> Fixed in Apache Tomcat
9.0.19</h3>
<div class="text">
Modified: tomcat/site/trunk/xdocs/security-8.xml
URL:
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-8.xml?rev=1861711&r1=1861710&r2=1861711&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/security-8.xml (original)
+++ tomcat/site/trunk/xdocs/security-8.xml Thu Jun 20 19:20:22 2019
@@ -50,6 +50,30 @@
</section>
+ <section name="Fixed in Apache Tomcat 8.5.41" rtext="13 May 2019">
+
+ <p><strong>Important: Denial of Service</strong>
+ <cve>CVE-2019-10072</cve></p>
+
+ <p>The fix for <cve>CVE-2019-0199</cve> was incomplete and did not address
+ HTTP/2 connection window exhaustion on write. By not sending
+ WINDOW_UPDATE messages for the connection window (stream 0) clients were
+ able to cause server-side threads to block eventually leading to thread
+ exhaustion and a DoS.</p>
+
+ <p>This was fixed with commits
+ <hashlink hash="0bcd69c">0bcd69c</hashlink> and
+ <hashlink hash="8d14c6f">8d14c6f</hashlink>.</p>
+
+ <p>This issue was reported to the Apache Tomcat Security Team by John
+ Simpson of Trend Micro Security Research working with Trend Micro's Zero
+ Day Initiative on 26 April 2019. The issue was made public on 20 June
+ 2019.</p>
+
+ <p>Affects: 8.5.0 to 8.5.40</p>
+
+ </section>
+
<section name="Fixed in Apache Tomcat 8.5.40" rtext="12 April 2019">
<p><strong>Important: Remote Code Execution on Windows</strong>
Modified: tomcat/site/trunk/xdocs/security-9.xml
URL:
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-9.xml?rev=1861711&r1=1861710&r2=1861711&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/security-9.xml (original)
+++ tomcat/site/trunk/xdocs/security-9.xml Thu Jun 20 19:20:22 2019
@@ -50,6 +50,30 @@
</section>
+ <section name="Fixed in Apache Tomcat 9.0.20" rtext="13 May 2019">
+
+ <p><strong>Important: Denial of Service</strong>
+ <cve>CVE-2019-10072</cve></p>
+
+ <p>The fix for <cve>CVE-2019-0199</cve> was incomplete and did not address
+ HTTP/2 connection window exhaustion on write. By not sending
+ WINDOW_UPDATE messages for the connection window (stream 0) clients were
+ able to cause server-side threads to block eventually leading to thread
+ exhaustion and a DoS.</p>
+
+ <p>This was fixed with commits
+ <hashlink hash="7f748eb">7f748eb</hashlink> and
+ <hashlink hash="ada725a">ada725a</hashlink>.</p>
+
+ <p>This issue was reported to the Apache Tomcat Security Team by John
+ Simpson of Trend Micro Security Research working with Trend Micro's Zero
+ Day Initiative on 26 April 2019. The issue was made public on 20 June
+ 2019.</p>
+
+ <p>Affects: 9.0.0.M1 to 9.0.19</p>
+
+ </section>
+
<section name="Fixed in Apache Tomcat 9.0.19" rtext="13 April 2019">
<p><i>Note: The issues below were fixed in Apache Tomcat 9.0.18 but the
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]